Digital Safety in a Dangerous World is officially published now!
I poured my heart into this book. Thank you, everyone.
https://www.kickstarter.com/projects/kimcrawley/digital-safety-in-a-dangerous-world/posts/4576687
MongoDB have a blog out about #MongoBleed
Notably:
- Internal find at MongoDB
- they notified customers of the issue and patch availability on December 23rd
- A security vendor published technical details on December 24th, Christmas Eve
- Somebody at Elastic, a direct competitor, published an exploit with full secret extraction feature on December 25th, Christmas Day
That was an impossible situation for orgs - the security industry poured fire on them and set their own customers on fire.
Digital Safety in a Dangerous World is officially published now!
I poured my heart into this book. Thank you, everyone.
https://www.kickstarter.com/projects/kimcrawley/digital-safety-in-a-dangerous-world/posts/4576687
A lawyer was explaining to court why he used AI when he was then caught using AI in that explanation of why he was using AI (earlier)
Okay that is legitimately sick:
LinkPro modifies the /etc/ld.so.preload configuration file to specify the path of the libld.so shared library that it embeds, with the goal of hiding various artifacts that could reveal the backdoor's presence.
Once libld.so is loaded at the execution of a program, for example /usr/bin/ls, it hooks (before glibc) several libc functions to modify results that could reveal the presence of LinkPro. Here is the observed behavior for the hooked functions:
Modifying LD_PRELOAD is a well-known TTP (T1574.006). However, most detections will be about the environment variable, not the .so files themselves being mutated. Of course, this all requires root to accomplish, but this kind of stealthy persistence is exactly what basic detection tools will miss.
Shadowrun Anarchy 2.0 Offers A Leaner, Meaner Classic Cyberpunk RPG
https://www.forbes.com/sites/robwieland/2025/08/27/shadowrun-anarchy-20-offers-a-leaner-meaner-classic-cyberpunk-rpg/?utm_source=flipboard&utm_medium=activitypub
Posted into Innovation @innovation-forbes
Ashley Rindsberg and Fox News are furious at Wikipedia editors for âattackingâ Charlie Kirk by... listing the viewpoints he prominently and publicly advocated
BTW #3 is probably worth paying attention to here: 3. Safety Considerations
Due to the highly sensitive nature of these leaked materials, we strongly advise anyone who chooses to download and analyze them to take proper operational security precautions. It may be possible that these files may contain potentially risky content and accessing them in an insecure environment could expose you to surveillance or malware.
Please consider analyzing these files only in an isolated (virtual) machine without internet access.
The Great Firewall of China has apparently experienced a great data spill. > 500gb of source code, work logs and internal communication records were leaked. Some light reading for the weekend /s
The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication records were leaked, revealing details of the GFW's research, development, and operations.
That NodeJS supply chain hack incident is amazing because the threat actor(tm) got RCE access to like a billion devices and ran the worldâs shittest Etherum dumper.
Imagine if they had done reverse shells instead, or automated lateral movement to ransomware deployment NotPetya style.
The thing that saved companies here was the threat actor was incompetent crypto boy, nothing more.