Serializing

73 Followers
57 Following
304 Posts
On my free time, I'm a tinker. For a living, I'm a security researcher that breaks and builds.
Websitehttps://www.serializing.me
GitHubhttps://github.com/serializingme
Twitchhttps://www.twitch.tv/serializingme
YouTubehttps://www.youtube.com/@SerializingMe

A once-grand Portuguese mansion, at the heart of a large wine-making estate. Now it stands in ruins, as it is being reclaimed by nature year-after-year.

#Portugal #Photography #Abandoned #UrbanExploration #LostPlaces #Wine #WineMaking

RE: https://mastodon.social/@inliniac/115966463966998157

Can't believe no one cares, to me this is the coolest thing ever ;-)

Anyway, extended it with #Suricata bridging two bond interfaces, each bonding 2 veth interfaces...

https://github.com/OISF/suricata/pull/14769

SCOOP: A hacktivist has scraped more than half a million payment records from a company that makes consumer-grade spyware and other phone tracking apps, exposing customers' email addresses and partial card payment numbers. TechCrunch verified the scraped data is authentic.

By @lorenzofb and me:

https://techcrunch.com/2026/02/09/hacktivist-scrapes-over-500000-stalkerware-customers-payment-records

Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than half-a-million people who bought access to phone surveillance and social media snooping apps had their email address and partial payment card numbers published online.

TechCrunch
How can we detect malicious documents exploiting CVE-2026-21509, the recent 0-day vulnerability in MS Office ?
=> I designed a YARA rule for this, which detects all the malicious files that have been reported.
I also improved oletools to analyze those files and see the suspicious URLs.
You can find the YARA rule and all the explanations about that vulnerability on my website https://decalage.info/CVE-2026-21509/

New, by me:

Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we’ll dig through digital clues left behind by the hackers, network operators and services that appear to have benefitted from Kimwolf’s spread.

https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/

For part one in this series, check out:

https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/

Santuário de Cristo Rei at the golden hour yesterday.

Praça do Comércio looking festive for the holiday. ❤️🇵🇹

#Lisboa #Portugal #Photography

When seven German journalist students do a better job of tracking down the sources of the drone flights over Europe than the security services...

https://www.digitaldigging.org/p/they-droned-back

They Droned Back

Young journalists expose Russian-linked vessels circling off the Dutch and German coast

Digital Digging with Henk van Ess

You may be tempted to think of prompt injection attacks against language models as "social engineering." Resist this temptation.

Prompt injection is a mathematical attack against a non-deterministic system. Language may be the substrate, but the substance is numerical vectors. In other words, thinking of the attack as human language is a pointless limitation. The possibilities of what can go into the prompt to produce undesirable output are functionally infinite.

Poetry, context shifting, and other human-like attacks are only the beginning. What comes next is a weaponization of the linguistic form in ways that seem utterly alien to human readers. But to the models, it's all just elements in the matrix.

Today in 1987, 38 years ago: The Max Headroom signal hijacking incident takes place, in which a pirate broadcast interrupts television broadcasts in Chicago.

#OnThisDay