<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-09T21:31:54Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Will Dormann</title>
  <author>
    <name>Will Dormann</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub12xhpqz0ygq7cy87pcyhpf06tgr0yf37uv9mcnzzqeg00n70tca5q0vzxeq.rss" />
  <link href="https://yabu.me/npub12xhpqz0ygq7cy87pcyhpf06tgr0yf37uv9mcnzzqeg00n70tca5q0vzxeq" />
  <id>https://yabu.me/npub12xhpqz0ygq7cy87pcyhpf06tgr0yf37uv9mcnzzqeg00n70tca5q0vzxeq</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/243/347/114/375/182/original/481f384cb5fcb03c.jpg</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/243/347/114/375/182/original/481f384cb5fcb03c.jpg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsqgyr4eut5rsfa2x03atldwftp9s4k49s202rxyf7mxamt6ah8nkszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksuzgg92</id>
    
      <title type="html">The folks at iTerm2 figured out a way to get [arbitrary code ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqgyr4eut5rsfa2x03atldwftp9s4k49s202rxyf7mxamt6ah8nkszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksuzgg92" />
    <content type="html">
      The folks at iTerm2 figured out a way to get [arbitrary code execution as the result of cat &amp;amp;lt;file&amp;amp;gt;](&lt;a href=&#34;https://blog.calif.io/p/mad-bugs-even-cat-readmetxt-is-not&#34;&gt;https://blog.calif.io/p/mad-bugs-even-cat-readmetxt-is-not&lt;/a&gt; ), which is... impressive?&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/434/067/860/519/298/original/4cb433f6a295d12d.mp4&#34;&gt;&lt;/video&gt;&lt;br/&gt;
    </content>
    <updated>2026-04-19T23:55:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsduk9gxuwntyrfd5d53g7rc2lyp85epwzj9k33pkm9ef4gjzrl7qczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks83477x</id>
    
      <title type="html">From the same author as ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsduk9gxuwntyrfd5d53g7rc2lyp85epwzj9k33pkm9ef4gjzrl7qczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks83477x" />
    <content type="html">
      From the same author as [BlueHammer](&lt;a href=&#34;https://github.com/Nightmare-Eclipse/BlueHammer&#34;&gt;https://github.com/Nightmare-Eclipse/BlueHammer&lt;/a&gt; ) we now have [RedSun](&lt;a href=&#34;https://github.com/Nightmare-Eclipse/RedSun&#34;&gt;https://github.com/Nightmare-Eclipse/RedSun&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/412/016/760/812/126/original/af2cf09911b90b83.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/412/016/764/961/933/original/c70c00109489ea5a.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/412/016/775/721/000/original/3fe5485c2580eca2.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-16T02:27:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs24r282tfxq5hvq36rvysj8xcjm0m8pvvptq632aw0ppcy3gseq2szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksyejyd2</id>
    
      <title type="html">A path that would make me feel more comfortable would be: &amp;gt; ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs24r282tfxq5hvq36rvysj8xcjm0m8pvvptq632aw0ppcy3gseq2szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksyejyd2" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvgq350u7rsgtccta8esctfa5dwg7g0nsxqltyy8j0pgunelan3yqdyx0a6&#39;&gt;nevent1q…x0a6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;A path that would make me feel more comfortable would be:&lt;br/&gt;&lt;br/&gt;&amp;gt; We&amp;#39;ve changed the default setting in Signal to not put message bodies in the (external-to-Signal) notifications database.  At least until the dust has settled.&lt;br/&gt;&lt;br/&gt;But no, the battle that is being chosen is:&lt;br/&gt;We are pleading with Apple to have self-deleting messages not be permanently retained in the notifications database.&lt;br/&gt;&lt;br/&gt;I get that security vs. usability are usually at odds with each other.  But I suppose I&amp;#39;d like a bit more transparency here.
    </content>
    <updated>2026-04-15T13:32:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdrneh533zgcgw65cwsw3q9crjckv05uj62uh7tqctsnh56u5vfsqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksl9wz6u</id>
    
      <title type="html">From a worse place on the interwebs. Implying: Signal message ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdrneh533zgcgw65cwsw3q9crjckv05uj62uh7tqctsnh56u5vfsqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksl9wz6u" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqnld4t8t6u6hpkpenusgm75mt3dh8yv6q508v87wayp68mktt8kcdcc2au&#39;&gt;nevent1q…c2au&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;From a worse place on the interwebs.&lt;br/&gt;Implying:&lt;br/&gt;Signal message content being present in Apple Notifications database even after Signal itself is deleted is apparently expected and fine.&lt;br/&gt;&lt;br/&gt;Signal message content being present for **self-deleting** messages is not (in their minds).&lt;br/&gt;&lt;br/&gt;🤔&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/408/541/015/099/359/original/fbc649f7a4c317fa.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-15T11:44:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqnld4t8t6u6hpkpenusgm75mt3dh8yv6q508v87wayp68mktt8kczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmg535h</id>
    
      <title type="html">From elsewhere on the interwebs: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqnld4t8t6u6hpkpenusgm75mt3dh8yv6q508v87wayp68mktt8kczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmg535h" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8n6tglkzr9jtew579yjj5j304qt2vtvrtch7aa7400efwk2j3dqgj2t5a5&#39;&gt;nevent1q…t5a5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;From elsewhere on the interwebs:&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/405/885/299/611/568/original/a9f8519ee94ab60d.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-15T00:28:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0u4tsgv64k5kfzntsve0exv5waktr7epnc99mh6knw4mpzle04agzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksduzucy</id>
    
      <title type="html">Yup. It seems to make the race condition unwinnable.</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0u4tsgv64k5kfzntsve0exv5waktr7epnc99mh6knw4mpzle04agzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksduzucy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspnpmy3yn6mgqp0tqf7hynq4sa3pdvka7n7yhld6qlr3unxzvevzcj96xpk&#39;&gt;nevent1q…6xpk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yup.  It seems to make the race condition unwinnable.
    </content>
    <updated>2026-04-14T21:19:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvygu0ykmhmslmhn889lld370yhtq9234nwkycu7whdh29lmh0wgczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkscvx66x</id>
    
      <title type="html">There is at least one Adobe Reader 0day being exploited in the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvygu0ykmhmslmhn889lld370yhtq9234nwkycu7whdh29lmh0wgczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkscvx66x" />
    <content type="html">
      There is at least one Adobe Reader 0day being exploited in the wild:&lt;br/&gt;&lt;a href=&#34;https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html&#34;&gt;https://justhaifei1.blogspot.com/2026/04/expmon-detected-sophisticated-zero-day-adobe-reader.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;TL;DR: One 0day is being used to simply communicate details to a C2 server to get further commands. Specifically, there is a vulnerability that allows reading arbitrary local files using Reader JavaScript. In this case, ntdll.dll and friends, so that the C2 knows specifically what version of Windows the victim is running.&lt;br/&gt;&lt;br/&gt;Nobody knows what secondary payload the C2 is delivering to selected targets. But it&amp;#39;s a direct pipeline to allow the C2 to run arbitrary JavaScript on the victim system.&lt;br/&gt;&lt;br/&gt;So I&amp;#39;ll bet dollars to donuts that there is a **second** more powerful vulnerability that the attackers have up their sleeves. Or at the very least, the same vulnerability that allows the privileged file read might be able to be leveraged to do something nasty. And the whole AES-encrypted C2 stuff is merely to not put the payload statically in the exploit PDF, allowing a dynamic payload for any given target.
    </content>
    <updated>2026-04-09T22:03:47Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8n6tglkzr9jtew579yjj5j304qt2vtvrtch7aa7400efwk2j3dqgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksr9kus7</id>
    
      <title type="html">On the macOS side of things, we have [confirmation that Signal ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8n6tglkzr9jtew579yjj5j304qt2vtvrtch7aa7400efwk2j3dqgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksr9kus7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxyvdq69xcxt6thl80l3fczc2zyqu77jmk9apteczfjj20qph9k9s3w34jw&#39;&gt;nevent1q…34jw&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;On the macOS side of things, we have [confirmation that Signal notification contents get stored, even for disappearing messages](&lt;a href=&#34;https://objective-see.org/blog/blog_0x2E.html&#34;&gt;https://objective-see.org/blog/blog_0x2E.html&lt;/a&gt; )&lt;br/&gt;&lt;br/&gt;iOS sadly offers less visibility into what&amp;#39;s going on. But the FBI probably appreciates that it&amp;#39;s happening there too.&lt;br/&gt;&lt;br/&gt;The default notification setting for Signal (on both iOS and macOS) ensures that potentially sensitive information leaks out of the Signal app.  This is unfortunate.
    </content>
    <updated>2026-04-09T19:44:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxyvdq69xcxt6thl80l3fczc2zyqu77jmk9apteczfjj20qph9k9szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstgpn30</id>
    
      <title type="html">Can we get a comment on this? 1) The default Signal setting to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxyvdq69xcxt6thl80l3fczc2zyqu77jmk9apteczfjj20qph9k9szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstgpn30" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs208kufk3yhrfdl0hwyqgh4kt34y5dgg9pwy2eeqdk8q044efl7qc7n8x00&#39;&gt;nevent1q…8x00&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Can we get a comment on this?&lt;br/&gt;&lt;br/&gt;1) The default Signal setting to show message contents in push notifications seems... bad, assuming this article is accurate.&lt;br/&gt;2) Does changing the in-Signal-app setting for Notification Content indeed prevent notifications from being stored **anywhere**, which by default contains incoming message **bodies**.
    </content>
    <updated>2026-04-09T15:50:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs208kufk3yhrfdl0hwyqgh4kt34y5dgg9pwy2eeqdk8q044efl7qczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks5fdsk6</id>
    
      <title type="html">Let me get this straight... The **default setting** for Signal on ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs208kufk3yhrfdl0hwyqgh4kt34y5dgg9pwy2eeqdk8q044efl7qczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks5fdsk6" />
    <content type="html">
      Let me get this straight...&lt;br/&gt;&lt;br/&gt;The **default setting** for Signal on an iPhone allows law enforcement to see the content of all incoming messages, even after the app has been deleted?  🤔&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/&#34;&gt;https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/375/318/988/912/395/original/cd2e38defe89c4af.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/375/319/484/821/201/original/fe0e2e85e6dc2ef5.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-09T14:56:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw3362k5hlg74js9x82q43pcwjj7q5jf7ng3dfmukcu7kc7glzefqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksskfahs</id>
    
      <title type="html">Yeah, that&amp;#39;s good. My spice collection is in every possible ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw3362k5hlg74js9x82q43pcwjj7q5jf7ng3dfmukcu7kc7glzefqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksskfahs" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2kvdrksrxmkyu9294pf6lewt4ydqsrmkmq0y8acas7w5hjttfr2qgu6f2g&#39;&gt;nevent1q…6f2g&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yeah, that&amp;#39;s good. &lt;br/&gt;&lt;br/&gt;My spice collection is in every possible container that exists, so no fixing that. 😂&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/370/536/400/007/455/original/6f0cfe7c628b6733.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-08T18:38:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsy5lma2htw5ljaldykdf9ghtjznmucx239y2qs227af8w7jtlf8kczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkslayv6t</id>
    
      <title type="html">That&amp;#39;s nice, but any time I see spice organization like this, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsy5lma2htw5ljaldykdf9ghtjznmucx239y2qs227af8w7jtlf8kczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkslayv6t" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswfp8n6yf96z20szkz8ty62tdd8g8d3rjvzjctgma5nxe0pvjt4eqarv5z6&#39;&gt;nevent1q…v5z6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;That&amp;#39;s nice, but any time I see spice organization like this, I can&amp;#39;t help but think: &amp;#34;all original containers prematurely go into a landfill, for reasons.&amp;#34;&lt;br/&gt;😂
    </content>
    <updated>2026-04-08T18:21:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9tzp2e34wsrgyjlhzqmv9zxm0hwdgkafqvfmqwq8qewnd0xkrteqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks4zwud6</id>
    
      <title type="html">It&amp;#39;s kind of neat. And slightly complex. But essentially the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9tzp2e34wsrgyjlhzqmv9zxm0hwdgkafqvfmqwq8qewnd0xkrteqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks4zwud6" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsy8n3eh3kwdpf0jescet7y06hsgy4k4elupe9hga85628an04sptcgp53yz&#39;&gt;nevent1q…53yz&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;It&amp;#39;s kind of neat. And slightly complex.&lt;br/&gt;But essentially the consequences of pissing off security researchers wanting to do the right thing.
    </content>
    <updated>2026-04-08T03:27:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsty8m0jcfhcatxwl7yl5p0cwnv4nv9vsyumyudqtp9tluhs7cmv8gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkserh9lq</id>
    
      <title type="html">I didn&amp;#39;t make the exploit. I merely looked at it after it was ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsty8m0jcfhcatxwl7yl5p0cwnv4nv9vsyumyudqtp9tluhs7cmv8gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkserh9lq" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrd30tgu769kezsr54ukzw4r3hzs3vec5nxj3afz86n2tg406e2jggdp7u7&#39;&gt;nevent1q…p7u7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I didn&amp;#39;t make the exploit. I merely looked at it after it was published. Now that I&amp;#39;m allowed to talk infosec publicly again.&lt;br/&gt;&lt;br/&gt;I also shared my thoughts about what it&amp;#39;s like to work with MSRC these days. 😂
    </content>
    <updated>2026-04-08T03:23:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8yrqxfv2xf6r3pw54zhpnfqlufu696ylj2l8x3gc8aa84sc53megzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks8x63my</id>
    
      <title type="html">There&amp;#39;s a new Windows 0day LPE that has been disclosed called ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8yrqxfv2xf6r3pw54zhpnfqlufu696ylj2l8x3gc8aa84sc53megzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks8x63my" />
    <content type="html">
      There&amp;#39;s a new Windows 0day LPE that has been disclosed called [BlueHammer](&lt;a href=&#34;https://github.com/Nightmare-Eclipse/BlueHammer&#34;&gt;https://github.com/Nightmare-Eclipse/BlueHammer&lt;/a&gt; ). The reporter [suggests](&lt;a href=&#34;https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html&#34;&gt;https://deadeclipse666.blogspot.com/2026/04/public-disclosure.html&lt;/a&gt; ) that it&amp;#39;s being disclosed due to how MSRC operates these days.&lt;br/&gt;&lt;br/&gt;MSRC used to be quite excellent to work with.&lt;br/&gt;But to save money Microsoft fired the skilled people, leaving flowchart followers.&lt;br/&gt;I wouldn&amp;#39;t be surprised if Microsoft closed the case after the reporter refused to submit a video of the exploit, since that&amp;#39;s apparently an MSRC requirement now. 😂&lt;br/&gt;&lt;br/&gt;Anyway, yeah, it works.  Maybe not 100% reliably, but well enough...&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/358/058/162/383/747/original/7d522a2d40cec255.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-06T13:46:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsygw470r0qe8yuxg98uekn3t4zwuk9wypukkphhk979gwwexynz3szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswgkxk8</id>
    
      <title type="html">Dear Linux UI people: If you want to round corners, cool. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsygw470r0qe8yuxg98uekn3t4zwuk9wypukkphhk979gwwexynz3szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswgkxk8" />
    <content type="html">
      Dear Linux UI people:&lt;br/&gt;If you want to round corners, cool.&lt;br/&gt;&lt;br/&gt;**However**, if you do round corners, maybe **just maybe** move the point where the cursor is activated to where the corner actually **is** after rounding.  Not where it **would have been** if you didn&amp;#39;t do the rounding.  🤷‍♂️&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/342/075/188/455/221/original/a10c931f6c0fa0ca.mp4&#34;&gt;&lt;/video&gt;&lt;br/&gt;
    </content>
    <updated>2026-04-03T18:00:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsx74pmlc6w83fjs9dgkxeklkg6vu5qzar66jrt3tq4psj3603cluszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksa9vruy</id>
    
      <title type="html">I&amp;#39;ve always known that I&amp;#39;m **terrible** at using websites ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsx74pmlc6w83fjs9dgkxeklkg6vu5qzar66jrt3tq4psj3603cluszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksa9vruy" />
    <content type="html">
      I&amp;#39;ve always known that I&amp;#39;m **terrible** at using websites (I never know where to click).  But I guess I&amp;#39;ve recently realized that this applies to apps as well.&lt;br/&gt;&lt;br/&gt;Today&amp;#39;s case: Paragon Hard Disk Manager.&lt;br/&gt;&lt;br/&gt;My goal: Mount a backup as a drive letter.&lt;br/&gt;After multiple rounds with support, I convinced them to indicate on a screenshot exactly where it is that I should click.&lt;br/&gt;&lt;br/&gt;I get that I&amp;#39;m possibly being obtuse, but I have **NEVER** in my computing years been drawn to click on a thin **DOTTED LINE** part of an arrow with the expectation of it doing something.&lt;br/&gt;&lt;br/&gt;And no, there was no mouse hover indication that the line had special meaning.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/336/792/652/990/016/original/5582a453244ee4d1.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/336/793/168/296/379/original/df302add1b68d9ba.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/336/801/859/576/328/original/0141f4e9822fc698.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-02T19:42:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqpt2te0zqp3qslrlcxmd7cd7fhzdgzxfnv4mxcwhkyq4s5unfuvgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksktrnw0</id>
    
      <title type="html">Call me crazy, but there are times when I think that ChatGPT ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqpt2te0zqp3qslrlcxmd7cd7fhzdgzxfnv4mxcwhkyq4s5unfuvgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksktrnw0" />
    <content type="html">
      Call me crazy, but there are times when I think that ChatGPT sprinkling in knowledge about what I normally ask is... **not** useful.&lt;br/&gt;&lt;br/&gt;This is from a question I asked about grease.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/262/125/391/332/770/original/49ed8ad5a126090f.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-03-20T15:08:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdwkw43kw8g7r6rvdsey6k3tp6ehldx35ysaqup3mpcpsvwfqpfmgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksngds6w</id>
    
      <title type="html">My local hardware store just installed a vending machine out ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdwkw43kw8g7r6rvdsey6k3tp6ehldx35ysaqup3mpcpsvwfqpfmgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksngds6w" />
    <content type="html">
      My local hardware store just installed a vending machine out front of it, in case you need things when they&amp;#39;re closed.&lt;br/&gt;I love it.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/201/699/300/335/899/original/9c33a05602a61b0b.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-03-09T23:00:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspc3vx46avc2h525c868dzgn9qnnnwgzvg7ttkum6hxmlshjp30kqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksh4xpfx</id>
    
      <title type="html">I already knew that we use nonsense measurement systems here in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspc3vx46avc2h525c868dzgn9qnnnwgzvg7ttkum6hxmlshjp30kqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksh4xpfx" />
    <content type="html">
      I already knew that we use nonsense measurement systems here in the US. But only recently did I realize that a US gallon is different than a UK gallon.&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/197/055/752/673/643/original/9e6c3c630064a3aa.mp4&#34;&gt;&lt;/video&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-09T03:19:57Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv324xea5wa69exlkmwuse6qjtn09j6mqqngaah4dh632lvsy0ukczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksceghhv</id>
    
      <title type="html">Ars Technica [retracted an ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv324xea5wa69exlkmwuse6qjtn09j6mqqngaah4dh632lvsy0ukczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksceghhv" />
    <content type="html">
      Ars Technica [retracted an article](&lt;a href=&#34;https://arstechnica.com/ai/2026/02/after-a-routine-code-rejection-an-ai-agent-published-a-hit-piece-on-someone-by-name/&#34;&gt;https://arstechnica.com/ai/2026/02/after-a-routine-code-rejection-an-ai-agent-published-a-hit-piece-on-someone-by-name/&lt;/a&gt; ) about how AI is making the world worse because...&lt;br/&gt;**the Ars article itself** contained AI-generated quotes in it.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://arstechnica.com/staff/2026/02/editors-note-retraction-of-article-containing-fabricated-quotations/&#34;&gt;https://arstechnica.com/staff/2026/02/editors-note-retraction-of-article-containing-fabricated-quotations/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Welp, we had a decent run, folks.  But it&amp;#39;s time to call it.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/076/049/706/592/161/original/a20b3659e47f7476.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-02-15T18:28:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstzp8huhe4wrgc73ypv0k72pnca437apzssutyjtz8edp28h6n5wczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksle8e2x</id>
    
      <title type="html">When you get a screenshot of an individual window in Windows, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstzp8huhe4wrgc73ypv0k72pnca437apzssutyjtz8edp28h6n5wczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksle8e2x" />
    <content type="html">
      When you get a screenshot of an individual window in Windows, using either Alt &#43; PrtScn or the fancy new Snipping Tool, you also capture the contents of whatever is **behind** the window around the edges.&lt;br/&gt;&lt;br/&gt;Linux doesn&amp;#39;t do this.&lt;br/&gt;macOS doesn&amp;#39;t do this.&lt;br/&gt;Just Windows.&lt;br/&gt;&lt;br/&gt;Why are expectations for how Windows works so low?&lt;br/&gt;Or has Microsoft crafted a world where they are not required to care?&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/946/059/945/899/333/original/827cd84b29ab8788.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/946/062/007/795/294/original/c57f226b386b39bd.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-01-23T19:29:49Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0vdra5ar3704k7829d29p4pajsd8tfyfpj58zmxdk3fff53lrl2qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksedvq58</id>
    
      <title type="html">I recently bought something from poshmark.com, for the first ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0vdra5ar3704k7829d29p4pajsd8tfyfpj58zmxdk3fff53lrl2qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksedvq58" />
    <content type="html">
      I recently bought something from poshmark.com, for the first time. While I haven&amp;#39;t heard of them before, I figure with credit card protections as they are in the US, there&amp;#39;s really no harm with giving it a shot.&lt;br/&gt;&lt;br/&gt;Within about **30 minutes** of placing my order, I got a not-very-good phishing email from purchase-orders@loyverse[.]com, claiming to be &amp;#34;Poshmark&amp;#34;.&lt;br/&gt;The first time in my life that I&amp;#39;ve received a phish from somebody claiming to be Poshmark.&lt;br/&gt;&lt;br/&gt;My wonders at this point:&amp;lt;li&amp;gt;Is Poshmark unknowingly leaking the email addresses of people who purchase through their site?&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Is Poshmark knowingly leaking the email addresses of people who purchase through their site?  Sub-wonder: If true, is this publicly known?&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Is the person whose Poshmark listing I purchased from either compromised or malicious?🤔&amp;lt;/li&amp;gt;
    </content>
    <updated>2025-12-31T14:43:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszzd2g9grzsepgqplpyj549pl95umswlq8pcn5t9r2qcqgw5jy4eszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksvumdzx</id>
    
      <title type="html">Surely you can come up with a higher contrast font color scheme ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszzd2g9grzsepgqplpyj549pl95umswlq8pcn5t9r2qcqgw5jy4eszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksvumdzx" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsfdgpkk8e560pte0fdela5fhjnvls722hvxywwccusngz63rvg0qgf8hekx&#39;&gt;nevent1q…hekx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Surely you can come up with a higher contrast font color scheme for your articles?&lt;br/&gt;Safari on iPhone here.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/791/871/445/397/841/original/dc15a7ea92019411.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-12-27T13:56:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfe6w22n3fgwglsn2fsasec4wyxksxfy0fphps724efu9uhvx7dnszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkscjv3mu</id>
    
      <title type="html">Microsoft: &amp;gt; As much as 30% of the company&amp;#39;s code is ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfe6w22n3fgwglsn2fsasec4wyxksxfy0fphps724efu9uhvx7dnszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkscjv3mu" />
    <content type="html">
      Microsoft:&lt;br/&gt;&lt;br/&gt;&amp;gt; As much as 30% of the company&amp;#39;s code is written by AI.&lt;br/&gt;&lt;br/&gt;Also Microsoft:&lt;br/&gt;Somehow we managed to make it so that [clicking the x in Task Manager doesn&amp;#39;t close the app](&lt;a href=&#34;https://www.windowslatest.com/2025/10/30/windows-11-kb5067036-issue-task-manager-wont-close-and-duplicates-may-hurt-performance/&#34;&gt;https://www.windowslatest.com/2025/10/30/windows-11-kb5067036-issue-task-manager-wont-close-and-duplicates-may-hurt-performance/&lt;/a&gt; ).  Whoopsie daisy!&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/463/758/861/236/645/original/2fff515a1fda37bf.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-10-30T15:12:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvhlvw2r84wwpz299shzu2hwrzxlaak3ejhcczkgj8q4ns8snehwszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksvnsght</id>
    
      <title type="html">I&amp;#39;ve noticed that Gmail is letting a pattern of spam messages ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvhlvw2r84wwpz299shzu2hwrzxlaak3ejhcczkgj8q4ns8snehwszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksvnsght" />
    <content type="html">
      I&amp;#39;ve noticed that Gmail is letting a pattern of spam messages through lately (maybe the past month or two?).&lt;br/&gt;&lt;br/&gt;With the subject line of Delivery Status Notification (Failure) and then just a junk email body.&lt;br/&gt;&lt;br/&gt;Just me?  Is using a subject line of Delivery Status Notification (Failure) really all it takes to get past Gmail&amp;#39;s spam filtering?&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/453/279/983/177/054/original/b0a6dc6f7a7cb502.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-10-28T18:48:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsftva72psj8y8xc946cafc9juvz9myv7c6dech4y8tntrkdpfgvzczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks8h9krq</id>
    
      <title type="html">TIL that I can take the part of my post-sauce tomatoes that ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsftva72psj8y8xc946cafc9juvz9myv7c6dech4y8tntrkdpfgvzczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks8h9krq" />
    <content type="html">
      TIL that I can take the part of my post-sauce tomatoes that I&amp;#39;d otherwise throw away (the skins), throw them in a spice grinder, and you get delicious tomato powder!mindblown.gif&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/437/080/249/765/993/original/0172c1fa588119e8.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-10-25T22:08:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp4mpuzz3vg07dgptvnvd7mda87z85ajugdq0hnpldmgz08sngl3czypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkskwfjpe</id>
    
      <title type="html">I initially had it at 60 and got the error. So I took their ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp4mpuzz3vg07dgptvnvd7mda87z85ajugdq0hnpldmgz08sngl3czypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkskwfjpe" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdklmp305gp2e76qsj99ndh320wzqmttr828zdjfpzc3wmyswc0aqcu4tux&#39;&gt;nevent1q…4tux&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I initially had it at 60 and got the error.&lt;br/&gt;So I took their suggestion of setting it to 59.  😂
    </content>
    <updated>2025-10-22T13:32:47Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq9wlachteum0chdtv7kq0pxwcnlhk8m3yrn8mwghunulql0jxnngzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswdcf7c</id>
    
      <title type="html">Never change, Linux. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq9wlachteum0chdtv7kq0pxwcnlhk8m3yrn8mwghunulql0jxnngzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswdcf7c" />
    <content type="html">
      Never change, Linux.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/418/026/377/254/515/original/c3defadb4ae6a24f.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-10-22T13:22:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxaatk458h5csu8tz5fescztf7qkf5sx5tushu4m22wugk3x4q6sqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2jwvec</id>
    
      <title type="html">Do you or somebody you know have a Windows 10 that isn&amp;#39;t fit ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxaatk458h5csu8tz5fescztf7qkf5sx5tushu4m22wugk3x4q6sqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2jwvec" />
    <content type="html">
      Do you or somebody you know have a Windows 10 that isn&amp;#39;t fit for a Windows 11 upgrade? (e.g. no TPM)&amp;lt;li&amp;gt;Get a Windows 11 25H2 ISO&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Run &amp;lt;code&amp;gt;setup /product server&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Enjoy your Windows 11 with no coerced Microsoft Account, TPM features, etc.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/389/760/139/297/698/original/a40929b810a7a5bd.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/389/760/525/928/238/original/359b7ab0e60c9842.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-10-17T13:34:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgtzeru7d09f9vtuvukc549hx2en0m543ldpdqkhv2pehpttcf8fqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksuv7vuz</id>
    
      <title type="html">Three clicks is a lot to expect, I suppose.</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgtzeru7d09f9vtuvukc549hx2en0m543ldpdqkhv2pehpttcf8fqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksuv7vuz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsy8j7xm3y3tx22ezfkkgm2a3gag7za7h7ycwclp2e7ntaeedzh5vgc2q454&#39;&gt;nevent1q…q454&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Three clicks is a lot to expect, I suppose.
    </content>
    <updated>2025-10-08T17:19:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9dh3ajahpef93vtfetdzzf4nzeqq0uf03aqqmwa3gqexguxtlzqgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksqn55jw</id>
    
      <title type="html">For some reason, people seem to be spun up about recent changes ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9dh3ajahpef93vtfetdzzf4nzeqq0uf03aqqmwa3gqexguxtlzqgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksqn55jw" />
    <content type="html">
      For some reason, people seem to be spun up about recent changes that allegedly force people to create Microsoft accounts during Windows 11 setup.&lt;br/&gt;&lt;br/&gt;Except, nothing is being forced.&lt;br/&gt;Windows 11 Pro or better:&lt;br/&gt;Just do the usual:&amp;lt;li&amp;gt;Set up for work or school&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Sign-in options&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Domain join instead&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Create local account.&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Windows 11 Home:&lt;br/&gt;Ok, fine. Microsoft has indeed removed the OOBE.CMD batch file. But you know what? You can run the command that a batch file runs without the batch file itself?reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /v BypassNRO /t REG_DWORD /d 1 /f&lt;br/&gt;&lt;br/&gt;Once you reboot, you&amp;#39;ll have the I don&amp;#39;t have internet link, where you can create a local account.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/098/324/820/507/original/0c702edb7cf88c97.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/098/336/907/693/original/73f8d637c48da2ec.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/098/349/572/219/original/643e0ae19d349b4f.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/339/099/231/060/018/original/d0c84dbe5a016502.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-10-08T14:52:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs85wgp9az4yjnknalzhkn5nmmuhc3svmy9w6fpnzhlhqgwdp290pqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksleph4z</id>
    
      <title type="html">I approve. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs85wgp9az4yjnknalzhkn5nmmuhc3svmy9w6fpnzhlhqgwdp290pqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksleph4z" />
    <content type="html">
      I approve.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/091/740/267/819/777/original/f82a022d7dde9742.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-08-25T22:23:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq5uaa7gsas5k5klvdkfad20ldrlz7wus5zdlsnvt5fcyspka9wuczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstpwna5</id>
    
      <title type="html">I leave for vacation a week ago with Twitter down, and as I ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq5uaa7gsas5k5klvdkfad20ldrlz7wus5zdlsnvt5fcyspka9wuczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstpwna5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8ppyvakujfquayr0va9wprlq2pmw6qrtemas6ksee7g74asfv9rgqjvdgt&#39;&gt;nevent1q…vdgt&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I leave for vacation a week ago with Twitter down, and as I return it&amp;#39;s (still/again/🤷‍♂️) down.&lt;br/&gt;Great job, folks!&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/563/217/651/895/953/original/1a241080547799f3.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-24T14:13:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8ppyvakujfquayr0va9wprlq2pmw6qrtemas6ksee7g74asfv9rgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksed9guq</id>
    
      <title type="html">Please don&amp;#39;t bother coming back. KTHXBYE ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8ppyvakujfquayr0va9wprlq2pmw6qrtemas6ksee7g74asfv9rgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksed9guq" />
    <content type="html">
      Please don&amp;#39;t bother coming back.&lt;br/&gt;KTHXBYE&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/523/377/317/595/933/original/b792df1bd59374e2.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-17T13:21:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfmnvlcesvlvpf9m7ny23lhqmpze2gh8uqq7x8xdhrtjsl5slevuczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksau3e7n</id>
    
      <title type="html">Ooh, another of my NTFS vulnerabilities that I reported **years** ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfmnvlcesvlvpf9m7ny23lhqmpze2gh8uqq7x8xdhrtjsl5slevuczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksau3e7n" />
    <content type="html">
      Ooh, another of my NTFS vulnerabilities that I reported **years** ago was patched today.  🎉&lt;br/&gt;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/501/728/289/047/593/original/127d5aa8905234a9.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-13T17:35:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxy8r0fs03fhvmfud7l2cys3p8tthes6f9tmzpkpgh6rnvxh558fgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks9gmj44</id>
    
      <title type="html">I&amp;#39;m at a meeting hosted by somebody else where they&amp;#39;re ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxy8r0fs03fhvmfud7l2cys3p8tthes6f9tmzpkpgh6rnvxh558fgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks9gmj44" />
    <content type="html">
      I&amp;#39;m at a meeting hosted by somebody else where they&amp;#39;re using Microsoft Teams, and in the chat I attempted to share an image that is on my laptop.  By clicking the &#43; button and Attach file.&lt;br/&gt;&lt;br/&gt;The result of doing this is that Teams puts the image in **MY COMPANY&amp;#39;S SHAREPOINT SERVER**, and nobody else in Teams can see the image because they **DON&amp;#39;T HAVE AN ACCOUNT** on my company&amp;#39;s SharePoint server.  🤦‍♂️&lt;br/&gt;&lt;br/&gt;Wonders:&lt;br/&gt;1) Has anybody at Microsoft actually tried **using** Teams?&lt;br/&gt;2) Why do people **choose** to use Teams?&lt;br/&gt;&lt;br/&gt;Aside: If you copy an image and press Cmd - V to put the image in the chat, Teams actually... puts the image in the chat.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/501/201/358/592/222/original/03cbbcbea6ab57d9.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-13T15:21:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgugdufutmnfhq80w4vvhvzkql220zyswne2h7sazsc3wlhxd766szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks560u2u</id>
    
      <title type="html">It&amp;#39;s fruit update time. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgugdufutmnfhq80w4vvhvzkql220zyswne2h7sazsc3wlhxd766szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks560u2u" />
    <content type="html">
      It&amp;#39;s fruit update time.&lt;br/&gt;&lt;a href=&#34;https://support.apple.com/en-us/100100&#34;&gt;https://support.apple.com/en-us/100100&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/496/091/652/470/910/original/31285c09c3d0fc9c.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-12T17:42:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdkcyy07v04kqp6esal3mdgngunu582mazlqj97azazlq2ctt0wegzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkszmne2y</id>
    
      <title type="html">You&amp;#39;ve got this. And a tomato is a perfect example of a thing ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdkcyy07v04kqp6esal3mdgngunu582mazlqj97azazlq2ctt0wegzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkszmne2y" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8532u5p6w9850lc8d0qnq42t7ggteve6uq7l4qdlll3z3vhs50eg8n3aq8&#39;&gt;nevent1q…3aq8&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;You&amp;#39;ve got this.&lt;br/&gt;And a tomato is a perfect example of a thing that is night and day when it comes to grocery store vs garden. 🎉
    </content>
    <updated>2025-05-09T13:36:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8yzty3csmm2tmp0llphkk3khe279n8x30yag6nw8hfsvh49g725qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksn0vylm</id>
    
      <title type="html">Here are my notes from last season: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8yzty3csmm2tmp0llphkk3khe279n8x30yag6nw8hfsvh49g725qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksn0vylm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsytuv0d73pwslwmtjgld2fkddqgsgsq6340efngu4t90jjzsmvgag0y6k3t&#39;&gt;nevent1q…6k3t&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Here are my notes from last season:&lt;br/&gt;&lt;a href=&#34;https://docs.google.com/document/d/1tOnZuUFsUPCxhaD-cgmQ6h8asci15UATkz7ul6MYad8/edit?usp=drivesdk&#34;&gt;https://docs.google.com/document/d/1tOnZuUFsUPCxhaD-cgmQ6h8asci15UATkz7ul6MYad8/edit?usp=drivesdk&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Tomato-specific I&amp;#39;d say to get some of the blossom rot stop spray. It&amp;#39;s magic. While egg shells sounds like a good idea, I&amp;#39;m not convinced that it does a thing, since calcium isn&amp;#39;t water soluble. (Tomatoes will get soft black spots on the blossom side if they don&amp;#39;t have enough calcium while growing)&lt;br/&gt;&lt;br/&gt;And if you really want to be in touch with the garden, get a soil test kit with those powder capsules. When it comes to the nutrients and pH, you&amp;#39;d never be able to tell with your eyes.&lt;br/&gt;&lt;br/&gt;But in the end, it&amp;#39;s just dirt &#43; water &#43; sun &#43; seeds. How much you put into it is up to you. Nature will take care of the rest. But you **will** get a better bounty with more effort spent. Guaranteed. 😀
    </content>
    <updated>2025-05-09T13:32:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8r950px2jx2dnjvv2tjcz8aeqsllhhpklzntk3ycgdx3w0pxee6qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksxj7x0k</id>
    
      <title type="html">Specifically, out of three seedlings that successfully ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8r950px2jx2dnjvv2tjcz8aeqsllhhpklzntk3ycgdx3w0pxee6qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksxj7x0k" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsp2lmnf99ff0klnvxjklzwwgecffvgtf4rex93fgpaqerdjcx9ruq795xk3&#39;&gt;nevent1q…5xk3&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Specifically, out of three seedlings that successfully germinated, each of them look exactly like this one. All of their plant friends who received the same treatment are fine.&lt;br/&gt;&lt;br/&gt;Bad batch of seeds maybe?&lt;br/&gt;&lt;br/&gt;/me lifts his skinny fists like antennas to heaven
    </content>
    <updated>2025-05-09T13:16:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp2lmnf99ff0klnvxjklzwwgecffvgtf4rex93fgpaqerdjcx9ruqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksgjskej</id>
    
      <title type="html">Last year: Not a single one of my Blue Beech tomato seedlings ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp2lmnf99ff0klnvxjklzwwgecffvgtf4rex93fgpaqerdjcx9ruqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksgjskej" />
    <content type="html">
      Last year: Not a single one of my Blue Beech tomato seedlings survived.&lt;br/&gt;This year:&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/478/041/040/737/214/original/32a57f757a3bfe20.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-09T13:12:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs96jk7s8lvvj9tsds7mdhp6yh0wg9r3vam6hlzjm74rzdq6gcd2sqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks8rz0e0</id>
    
      <title type="html">TBH, I&amp;#39;ve never really fully grok&amp;#39;d what Tamper ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs96jk7s8lvvj9tsds7mdhp6yh0wg9r3vam6hlzjm74rzdq6gcd2sqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks8rz0e0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrm0v6jjxn86l9z8m9gqgyzurhfyya3m08vj7dgsvaf7s8vyrt4wqk5szm5&#39;&gt;nevent1q…szm5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;TBH, I&amp;#39;ve never really fully grok&amp;#39;d what Tamper Protection actually does.&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s a PoC of a bypass that I found a long time ago.  🤷‍♂️&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/478/007/440/392/968/original/729ad9588b5ff4c3.mp4&#34;&gt;&lt;/video&gt;&lt;br/&gt;
    </content>
    <updated>2025-05-09T13:03:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd69u7edatahdmd9qqry9xjuwjkjy7emeqjwyem2j0er8vacw3vsqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkshf39uv</id>
    
      <title type="html">No, Tamper Protection does nothing to stop this. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd69u7edatahdmd9qqry9xjuwjkjy7emeqjwyem2j0er8vacw3vsqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkshf39uv" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswe77ehy8l4gmvl7n3z9vdf9rhhjca5nhq0q4gwm30tz8dhe5x4vctjnsa8&#39;&gt;nevent1q…nsa8&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;No, Tamper Protection does nothing to stop this.&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/475/168/930/570/810/original/2600e081f6982feb.mp4&#34;&gt;&lt;/video&gt;&lt;br/&gt;
    </content>
    <updated>2025-05-09T01:01:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8jmx7vmx6wy5q9vd6vzdchr0um0y57jnkfxaztypzxy3e7vmqn6szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksz09ad8</id>
    
      <title type="html">Neat way to disable Windows Defender (or possibly other AV ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8jmx7vmx6wy5q9vd6vzdchr0um0y57jnkfxaztypzxy3e7vmqn6szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksz09ad8" />
    <content type="html">
      Neat way to disable Windows Defender (or possibly other AV products)...&lt;br/&gt;&lt;br/&gt;Register a no-op AV product in the Windows Security Center (WSC).  This action is protected by an NDA that AV vendors sign, and, well...&lt;br/&gt;&lt;br/&gt;Anyway, yeah, admin users can do admin things. Don&amp;#39;t forget that.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/es3n1n/defendnot&#34;&gt;https://github.com/es3n1n/defendnot&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/474/016/191/416/836/original/c1cc0ab02f3454bc.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-08T20:08:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdtz96nxluh8l9665y9srjw86346sjmx4k95qsrck9qc4xexzxuzgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks93wc5c</id>
    
      <title type="html">I&amp;#39;ll admit that even with the [updated explicit instructions ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdtz96nxluh8l9665y9srjw86346sjmx4k95qsrck9qc4xexzxuzgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks93wc5c" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsgcu8uqwjsrneyj63f0xfw8nrcteg3zs0vcp87kdpcsy4a7qvfz9svuqgcf&#39;&gt;nevent1q…qgcf&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;ll admit that even with the [updated explicit instructions on how to get Commvault updates](&lt;a href=&#34;https://documentation.commvault.com/11.38/essential/downloading_software_on_demand.html&#34;&gt;https://documentation.commvault.com/11.38/essential/downloading_software_on_demand.html&lt;/a&gt; ), I fail to see how one can get these mythical SP38-CU25-434 and SP38-CU25-438 optional updates.&lt;br/&gt;&lt;br/&gt;When I first go to &amp;#34;Download or copy software&amp;#34;, Commvault tells me that I&amp;#39;m Up-to-date&lt;br/&gt;&lt;br/&gt;If I **manually** force a download of Latest Fixes for Current Release: 11.38.25, I get an installer that specifies:&amp;lt;code&amp;gt;[Image Information]&amp;lt;br&amp;gt;Version=11.80.380.0&amp;lt;br&amp;gt;ServicePack=38&amp;lt;br&amp;gt;SPTranID=6988515&amp;lt;br&amp;gt;UnixTime=1732240991&amp;lt;br&amp;gt;RevisionNumber=1352&amp;lt;br&amp;gt;Tip=1&amp;lt;br&amp;gt;ReducedMedia=1&amp;lt;br&amp;gt;&amp;lt;/code&amp;gt;&lt;br/&gt;&lt;br/&gt;And if I run this installer and even reboot for good measure, the system is still vulnerable.  And the jar that contains the vulnerable code, cv-ac-common.jar has not changed from my original 11.38.25 vulnerable system.&lt;br/&gt;&lt;br/&gt;I&amp;#39;m not particularly good with computers, so hopefully Commvault sysadmins in the real world are better at this than I am.  But I&amp;#39;ll admit that even with explicit instructions, I have no idea how to get the updates that protect me against CVE-2025-34028.🤷‍♂️&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/625/502/384/086/original/45466ea5816f3fef.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/626/098/201/251/original/1e08cf8bfc350eb5.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-07T04:37:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgcu8uqwjsrneyj63f0xfw8nrcteg3zs0vcp87kdpcsy4a7qvfz9szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksavda2f</id>
    
      <title type="html">Oh, wow. Only after pestering the Commvault PSIRT did they update ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgcu8uqwjsrneyj63f0xfw8nrcteg3zs0vcp87kdpcsy4a7qvfz9szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksavda2f" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxe8mgh7wpwh4kdz6v3ly4f24v8r7r6zma64jycgc9qfhlcnzcqcctaneyu&#39;&gt;nevent1q…neyu&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Oh, wow.&lt;br/&gt;&lt;br/&gt;Only after pestering the Commvault PSIRT did they update the language of their advisory.&lt;br/&gt;&lt;br/&gt;While it **still** incorrectly says that 11.38.0 - 11.38.19 are affected and that 11.38.20 is resolved (it is not), the&amp;#39;ve added a section below this misinformation to convey the actual state of the world:&lt;br/&gt;&lt;br/&gt;11.38.20 is only patched if it has the SP38-CU20-433 **and** SP38-CU20-436 **additional** updates installed.&lt;br/&gt;&lt;br/&gt;And 11.38.25 is only patched if it has the SP38-CU25-434 **and** SP38-CU25-438 **additional** updates installed.&lt;br/&gt;&lt;br/&gt;I cannot think of a behavior that is more vindictive to their customers to botch language in an advisory so bad, and **also** to not bother bumping release versions for the fixes for a CVSS 10 EITW vulnerability.  🤦‍♂️&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/450/506/092/601/original/f3c0de7a8753837f.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/464/451/116/329/288/original/814b4ab3c55bf412.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-07T03:35:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxe8mgh7wpwh4kdz6v3ly4f24v8r7r6zma64jycgc9qfhlcnzcqcczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksaux5ye</id>
    
      <title type="html">Now that I have a local copy of the Commvault VM so that I ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxe8mgh7wpwh4kdz6v3ly4f24v8r7r6zma64jycgc9qfhlcnzcqcczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksaux5ye" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs87k85n3e7uder7ch2kejhj9svthk2aq2h59atux0yftfvg8qs6zqmau4q4&#39;&gt;nevent1q…u4q4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Now that I have a local copy of the Commvault VM so that I don&amp;#39;t burn truckloads of Azure dollars, I can look at things at my leisure.&lt;br/&gt;&lt;br/&gt;**AND**, it seems that the VM that I have is 11.38.25, which contains the fix for CVE-2025-34028.&lt;br/&gt;&lt;br/&gt;**EXCEPT** the exploit for CVE-2025-34028 still works against it.  🤦‍♂️&lt;br/&gt;&lt;br/&gt;Commvault claims that 11.38.20 **and** 11.38.25 fixes the watchTowr-reported CVE-2025-34028 vulnerability. (Aside: How is it even possible that **two** different versions in the same product line are the ones that fix a single vulnerability?)  watchTowr [discovered the bug in 11.38.20](&lt;a href=&#34;https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/&#34;&gt;https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;I trust watchTowr, so I don&amp;#39;t believe Commvault&amp;#39;s statement that 11.38.20 fixes the vulnerability that watchTowr found in 11.38.20.&lt;br/&gt;&lt;br/&gt;I also trust the PoC that I just ran against 11.38.25, so I don&amp;#39;t believe Commvault&amp;#39;s statement that 11.38.25 fixes the vulnerability that watchTowr found in 11.38.20.&lt;br/&gt;&lt;br/&gt;Yes, I have trust issues.  😕&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/901/003/124/252/original/4d7dcf947b77b06c.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/903/072/597/218/original/bc949823bc70c827.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/458/905/102/553/591/original/8249341a63d86457.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-06T04:06:49Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs87k85n3e7uder7ch2kejhj9svthk2aq2h59atux0yftfvg8qs6zqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2qagev</id>
    
      <title type="html">After successfully touching grass and beginning to write up ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs87k85n3e7uder7ch2kejhj9svthk2aq2h59atux0yftfvg8qs6zqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2qagev" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsv09eey7n8uvgwqpwlk3hadnllszesyhkz35kcf82jwvvgvr7fyrcnjmkfc&#39;&gt;nevent1q…mkfc&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;After successfully touching grass and beginning to write up CVE-2025-34028...&lt;br/&gt;&lt;br/&gt;CVE-2025-34028 is a path traversal vulnerability. And yes, the path traversal allows for an unauthenticated attacker to plant files in arbitrary locations.  And presumably Commvault has fixed the path traversal part.&lt;br/&gt;&lt;br/&gt;**BUT**, what about the fact that deployCCPackage() is reachable **by design** (by way of deployServiceCommcell.do being explicitly listed in authSkipRules.xml)?&lt;br/&gt;&lt;br/&gt;Directory traversal aside, in what world does the ability for an unauthenticated client to deploy a Command Center package make sense, whatever that means?  🤔
    </content>
    <updated>2025-05-01T18:55:42Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszv26cft604malu9jhtag4av4skpwwvdhcqekhx6kxhgea5ndkejgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksh49lqy</id>
    
      <title type="html">Thanks. Yes, you can still RDP in with the old password after the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszv26cft604malu9jhtag4av4skpwwvdhcqekhx6kxhgea5ndkejgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksh49lqy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszj4ntfqayg0r3sk7k3efueh3a89dqv0w45ajctp287srushg90kgls65tp&#39;&gt;nevent1q…65tp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Thanks.&lt;br/&gt;Yes, you can still RDP in with the old password after the account has been switched to passwordless.  No Microsoft Authenticator required.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/433/133/528/491/341/original/085a25003a5ee86b.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/433/137/940/672/639/original/69b69794726d790b.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-01T14:52:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd9xnxn7xwc35x78w4umrtm048537klwx0xv7qfq3g9a9lf7klpeqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksv853gt</id>
    
      <title type="html">Not sure what you mean... My hotmail account **is** passwordless? ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd9xnxn7xwc35x78w4umrtm048537klwx0xv7qfq3g9a9lf7klpeqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksv853gt" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8hlnq6zsex2uf7eyfcy3706qjkl9ps07wj49p08dgqzmwfg4t5gsz9s38l&#39;&gt;nevent1q…s38l&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Not sure what you mean...&lt;br/&gt;My hotmail account **is** passwordless?  (Locally it uses a PIN)&lt;br/&gt;&lt;br/&gt;Unless you&amp;#39;re talking about something else?
    </content>
    <updated>2025-05-01T12:39:57Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvkjrezz6e0mv3knsz5qh424nx7tey0g6ms2n7xf9ml2lnuedaxqqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkse7sumc</id>
    
      <title type="html">In my case: Windows 11 Enterprise with a local account initially ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvkjrezz6e0mv3knsz5qh424nx7tey0g6ms2n7xf9ml2lnuedaxqqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkse7sumc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsq6hyeecyuhky9mz4uygvprhkvzzcpmyehhdz2ufaegqsckl83f9szux65y&#39;&gt;nevent1q…x65y&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;In my case:&lt;br/&gt;Windows 11 Enterprise with a local account initially (via BYPASSNRO)&lt;br/&gt;I added a Microsoft (hotmail.com) account.&lt;br/&gt;I then turned on RDP.&lt;br/&gt;That&amp;#39;s all. Absolutely nothing else.&lt;br/&gt;&lt;br/&gt;If I log in via that hotmail account to RDP, it will accept the original cached password even if I change my hotmail account password.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/429/420/945/735/068/original/f090a15060e8ba01.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/429/422/475/304/248/original/6caffd399e4feb41.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-30T23:07:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr72dz5sx652n9qd7pnze3feycmq2a9juhqnt5qsvd74fy6tkmcgqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks4z9acm</id>
    
      <title type="html">Hm, that all sounds different than what I tested.</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr72dz5sx652n9qd7pnze3feycmq2a9juhqnt5qsvd74fy6tkmcgqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks4z9acm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqf0x9zksg347qv5s7mlpzwktyqja8xl3fg29z7ppck5tjw0ccenqg0gwa8&#39;&gt;nevent1q…gwa8&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Hm, that all sounds different than what I tested.
    </content>
    <updated>2025-04-30T23:01:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspn4yl0a58aqdpgry8s5lklzyv36m50a8vmj9lug9r0dfqlv0s95szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks450gp6</id>
    
      <title type="html">Really? I found it quite easy: 1) log in to windows with a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspn4yl0a58aqdpgry8s5lklzyv36m50a8vmj9lug9r0dfqlv0s95szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks450gp6" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsy3ad6wnxsfwp2wa5tlm2skktas0hmjgnmdz9yn4jmg0fgtzylg2cmynh32&#39;&gt;nevent1q…nh32&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Really? I found it quite easy:&lt;br/&gt;1) log in to windows with a Microsoft account &lt;br/&gt;2) Turn on RDP&lt;br/&gt;🤷‍♂️
    </content>
    <updated>2025-04-30T22:11:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgcug22wp8s5mjdcsvxawnvkedx9xndxm9yxdcvrfgr8ynnnd7vjgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks4s9sex</id>
    
      <title type="html">Yeah, I didn&amp;#39;t have a local AD ready to test. But I could ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgcug22wp8s5mjdcsvxawnvkedx9xndxm9yxdcvrfgr8ynnnd7vjgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks4s9sex" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqfrpm8lt9eyevyyelunzau5dvttzzza8j2lfpxqq9lhumswjaq7q7pajuh&#39;&gt;nevent1q…ajuh&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yeah, I didn&amp;#39;t have a local AD ready to test.&lt;br/&gt;But I could definitely see a difference with authenticating RDP using a local account vs. an online account.&lt;br/&gt;With local accounts, the instant the password changes, the RDP client needs the new password.&lt;br/&gt;For online accounts, the old password still works, indefinitely.
    </content>
    <updated>2025-04-30T19:58:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszcksypjc43wxszcyd8ddy5gnvjnhcaj9vymjs4zqscfhn79v9sgczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks9lr6r9</id>
    
      <title type="html">I&amp;#39;ve seen no evidence that the RDP cred cache gets updated ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszcksypjc43wxszcyd8ddy5gnvjnhcaj9vymjs4zqscfhn79v9sgczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks9lr6r9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrwu8lj3htjm35ttqqldaxr47y79m4auuzmnkma5mmfpve87zn6ss828n3q&#39;&gt;nevent1q…8n3q&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;ve seen no evidence that the RDP cred cache gets updated ever.&lt;br/&gt;Granted, I only started looking at this very recently, but the reporter seems to indicate that this is the case.
    </content>
    <updated>2025-04-30T19:36:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswrllxnwag5dlvd7tyqwl3akvk6laaafwz8ap8flcedsam4rycgtszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkske7m0u</id>
    
      <title type="html">Google published a [blog post about 0days and the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswrllxnwag5dlvd7tyqwl3akvk6laaafwz8ap8flcedsam4rycgtszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkske7m0u" />
    <content type="html">
      Google published a [blog post about 0days and the like](&lt;a href=&#34;https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends&#34;&gt;https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends&lt;/a&gt; ).  This jumped out at me:&lt;br/&gt;&lt;br/&gt;&amp;gt; Vendor investments in exploit mitigations are having a clear impact on where threat actors are able to find success.&lt;br/&gt;&lt;br/&gt;Stack canaries gained popularity in the Linux world in 2002. When did the Linux-based Ivanti ICS product get stack canaries, after years of ITW exploitation?  2025. That&amp;#39;s right. They decided to wait **TWENTY THREE YEARS** before deciding to turn on a compile-time flag that would have prevented successful exploitation of April&amp;#39;s CVE-2025-22457.&lt;br/&gt;&lt;br/&gt;We all know that comparing the security disposition of companies/products based on CVE counts is both foolish and futile, but sometimes they make it easy for us. 😂
    </content>
    <updated>2025-04-29T12:49:13Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv09eey7n8uvgwqpwlk3hadnllszesyhkz35kcf82jwvvgvr7fyrczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksztjl7s</id>
    
      <title type="html">Oh, what&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv09eey7n8uvgwqpwlk3hadnllszesyhkz35kcf82jwvvgvr7fyrczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksztjl7s" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8d2jyzpa3gf72pknsw0x5dd6q4xn4g4q6u3y9k3rjtja0jc8j49qsfv545&#39;&gt;nevent1q…v545&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Oh, what&amp;#39;s that?&amp;#39;NICIPConfigUpdateDeployment-1745511600265&amp;#39; is not valid&lt;br/&gt;?&lt;br/&gt;&lt;br/&gt;Oh, let me put my Azure translation hat on.  Ok, got it:&lt;br/&gt;&lt;br/&gt;&amp;gt; You have exceeded your limit of 10 publicly available IP addresses. Please &amp;gt; **first**&amp;gt;  Disassociate&amp;gt;  the IP address and &amp;gt; **then**&amp;gt;  delete it. Otherwise you will get another error message.&lt;br/&gt;&lt;br/&gt;Boy, this hat is useful.&lt;br/&gt;Just kidding. There&amp;#39;s no such hat.&lt;br/&gt;You need to trudge through things until you brute-force figure things out.&lt;br/&gt;&lt;br/&gt;Time to go touch grass...&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/394/045/439/163/623/original/30076432cca1f602.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-24T17:11:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8d2jyzpa3gf72pknsw0x5dd6q4xn4g4q6u3y9k3rjtja0jc8j49qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2yalh3</id>
    
      <title type="html">What&amp;#39;s that? The &amp;#34;Most used by Azure users&amp;#34; VM type ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8d2jyzpa3gf72pknsw0x5dd6q4xn4g4q6u3y9k3rjtja0jc8j49qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2yalh3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsp9t4qdllm7fgl028qdqfnkhuh278njw3qgxzc82vap0js5k56ddg3jke4t&#39;&gt;nevent1q…ke4t&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;What&amp;#39;s that?&lt;br/&gt;&lt;br/&gt;The &amp;#34;Most used by Azure users&amp;#34; VM type that I picked isn&amp;#39;t available?&lt;br/&gt;&lt;br/&gt;You know what, instead of Go Fish, maybe tell me what I can use?&lt;br/&gt;&lt;br/&gt;**Edit**: Azure Spot pricing apparently isn&amp;#39;t a thing.  No matter which Size &#43; Region combination you choose, you&amp;#39;ll get an error that says that the combo isn&amp;#39;t available where you want it.  🤦‍♂️&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/820/926/795/345/original/5559760f76334056.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/821/371/981/644/original/c122cb0b6873f44a.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-24T16:25:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp9t4qdllm7fgl028qdqfnkhuh278njw3qgxzc82vap0js5k56ddgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkszj33kr</id>
    
      <title type="html">What&amp;#39;s that? I need to remove the number of data disks in my ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp9t4qdllm7fgl028qdqfnkhuh278njw3qgxzc82vap0js5k56ddgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkszj33kr" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqst7g9paq94cm2rggs2wa5ny8ef4hju305m3tk5fm23xjupr5kastsrhcaep&#39;&gt;nevent1q…caep&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;What&amp;#39;s that? I need to remove the number of data disks in my VM?  Maybe tell me how to do this?&lt;br/&gt;&lt;br/&gt;**Ohhhh**...   You&amp;#39;ve selected an Azure VM image that requires more than 4 disks, and the VM type currently selected has only 4 disks?   I&amp;#39;m no UI/UX expert, but maybe just **TELL ME THIS**?&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/791/242/538/845/original/68441ab2dff3f3c5.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-24T16:12:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst7g9paq94cm2rggs2wa5ny8ef4hju305m3tk5fm23xjupr5kastszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks7uusln</id>
    
      <title type="html">If you create an ARM VM in Azure, beware that your &amp;#34;Recently ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst7g9paq94cm2rggs2wa5ny8ef4hju305m3tk5fm23xjupr5kastszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks7uusln" />
    <content type="html">
      If you create an ARM VM in Azure, beware that your &amp;#34;Recently used size&amp;#34; will be ARM, and as such you will not be able to create any preconfigured x64 VMs.&lt;br/&gt;&lt;br/&gt;Because of course if your &amp;#34;Recently used size&amp;#34; is ARM, Microsoft will disable the ability to pick an x64 size.  🤦‍♂️&lt;br/&gt;&lt;br/&gt;Yes, I had to create a sacrificial x84 VM in Azure to work around this. Once my recently used size was x64, I was able to pick any size that I wanted.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/047/299/710/original/b8c83e056a7bd900.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/393/660/464/816/983/original/b2b5148efbc9de3f.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-24T16:02:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0ff3h55u0az8u6u6wj2paw65fve6g6l84fftpjv9jqg32w8jrf2szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksqns9qz</id>
    
      <title type="html">From over at the Bad Site ™ Both the vulnerability and the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0ff3h55u0az8u6u6wj2paw65fve6g6l84fftpjv9jqg32w8jrf2szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksqns9qz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs850cw7atfevfqsarurmmp0euwpqxnjnrhvsj5kz57dy45wah2dnqjv8w98&#39;&gt;nevent1q…8w98&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;From over at the Bad Site ™&lt;br/&gt;Both the vulnerability and the &amp;#34;fix&amp;#34; for CVE-2025-21204 are quite silly.&lt;br/&gt;&lt;br/&gt;The scenario is:&amp;lt;li&amp;gt;Non-admin user creates &amp;lt;code&amp;gt;C:\inetpub\wwwroot&amp;lt;/code&amp;gt; directory and puts web content there&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Admin user at some point in the future enables IIS on the system.&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;The outcome is:&lt;br/&gt;The web content provided by the non-admin user (be it a web shell or whatnot) is served up by IIS.&lt;br/&gt;&lt;br/&gt;Maybe non-admin users shouldn&amp;#39;t be able to make directories or junctions (to directories or files) in C:\?&lt;br/&gt;NAH.&lt;br/&gt;&lt;br/&gt;Maybe installing IIS should provide a clean webroot when it&amp;#39;s installed?&lt;br/&gt;NAH.&lt;br/&gt;&lt;br/&gt;Just preemptively make a C:\inetpub directory that non-admin users can&amp;#39;t write to. That fixes the problem.  🤦‍♂️&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/353/620/324/754/138/original/fcf2349753b50d90.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-17T13:50:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0knp2uvv2034w5q9akmwwzxxm7gz506x628fn7n7p0n0ngka7q6gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks5xldnt</id>
    
      <title type="html">Get your Apple updates folks. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0knp2uvv2034w5q9akmwwzxxm7gz506x628fn7n7p0n0ngka7q6gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks5xldnt" />
    <content type="html">
      Get your Apple updates folks.&lt;br/&gt;&lt;a href=&#34;https://support.apple.com/en-us/100100&#34;&gt;https://support.apple.com/en-us/100100&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;CVE-2025-31200 and CVE-2025-31201 are being exploited ITW.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/349/460/193/856/875/original/192ef3c5baac44a7.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-16T20:11:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs09vvnnwm0p2sn69pkpu2pxm3jxsft5yqvwacjlrsw6xp8xdelv5qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksau8r43</id>
    
      <title type="html">Microsoft blocks ActiveX by default in Microsoft 365, Office 2024 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs09vvnnwm0p2sn69pkpu2pxm3jxsft5yqvwacjlrsw6xp8xdelv5qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksau8r43" />
    <content type="html">
      Microsoft blocks ActiveX by default in Microsoft 365, Office 2024&lt;br/&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/microsoft-blocks-activex-by-default-in-microsoft-365-office-2024/&#34;&gt;https://www.bleepingcomputer.com/news/microsoft/microsoft-blocks-activex-by-default-in-microsoft-365-office-2024/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;About damn time!&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/345/323/808/365/253/original/5298a4f71037e0f1.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-16T02:39:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr23k855mux2f68luqdegft4guz5lve8x7e89x8utdweutmwpgpxczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksvpfer4</id>
    
      <title type="html">If I remember my testing properly, a junction to a folder does ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr23k855mux2f68luqdegft4guz5lve8x7e89x8utdweutmwpgpxczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksvpfer4" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswlf0wx4cs550wzkx6l5vttr6vynmh9dlys9pkncu5r6n8nrxumfs5t0crx&#39;&gt;nevent1q…0crx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If I remember my testing properly, a junction to a folder does not break the update. But a weird junction to a file (which Microsoft claims is not possible) does break the April update.&lt;br/&gt;&lt;br/&gt;Which mirrors the test that a C:\inetpub directory does not break the update but a C:\inetpub file **does** break things. Except that the junction variant is something a non-admin user can do.
    </content>
    <updated>2025-04-14T11:31:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs850cw7atfevfqsarurmmp0euwpqxnjnrhvsj5kz57dy45wah2dnqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksty8xqr</id>
    
      <title type="html">Would changing the ACLs to not allow non-admin users the ability ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs850cw7atfevfqsarurmmp0euwpqxnjnrhvsj5kz57dy45wah2dnqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksty8xqr" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspmulz0krx4mxxrst68850qh0vxlln92ckp43m9csqxw3w57cqedq6unqve&#39;&gt;nevent1q…nqve&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Would changing the ACLs to not allow non-admin users the ability to create directories off of C:\ **really** have a real-world impact of limiting LPEs?&lt;br/&gt;&lt;br/&gt;Absolutely. When you write a tool to look for things (e.g. [Crassus](&lt;a href=&#34;https://github.com/vu-ls/crassus&#34;&gt;https://github.com/vu-ls/crassus&lt;/a&gt; )), you see things. Heck, I&amp;#39;ve seen a privileged service attempt to open files in C:\Program%20Files\, which any non-admin Windows user can create by default.&lt;br/&gt;&lt;br/&gt;But no, even despite being presented with evidence for how this could fix an entire **CLASS** of LPEs on Windows, MSRC was not interested.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/319/328/558/499/280/original/9f375a596e6be1fe.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/319/328/591/059/828/original/be09298e7e7ce5a8.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/319/328/622/114/978/original/142b3c0de51b5c9b.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/319/328/635/901/976/original/e1f0e54c4a14ddad.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-11T12:29:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg7xtp6vply0hxx5m5fuqk4tklz8d2kx862lst7jz6tn8mu5xh40qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksjcmysq</id>
    
      <title type="html">Hilarious. The two things that MSRC seems to aim to to achieve ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg7xtp6vply0hxx5m5fuqk4tklz8d2kx862lst7jz6tn8mu5xh40qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksjcmysq" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8qcs2f77xdkcvm8erjk585jxf8h2956skk0a0p2vezag3e53yxucxjy29z&#39;&gt;nevent1q…y29z&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Hilarious.&lt;br/&gt;The two things that MSRC seems to aim to to achieve are:&amp;lt;li&amp;gt;Avoid saying anything about what their security updates do unless their hand is forced.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Take the path of &amp;#34;least resistance&amp;#34; as opposed to fixing the root cause of problems. (In this case, non-admins can create subdirectories directly off of &amp;lt;code&amp;gt;C:\&amp;lt;/code&amp;gt;)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://infosec.exchange/@wdormann/114319281111054638&#34;&gt;https://infosec.exchange/@wdormann/114319281111054638&lt;/a&gt;
    </content>
    <updated>2025-04-11T12:20:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspmulz0krx4mxxrst68850qh0vxlln92ckp43m9csqxw3w57cqedqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks085c44</id>
    
      <title type="html">So, apparently this is the &amp;#34;fix&amp;#34; for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspmulz0krx4mxxrst68850qh0vxlln92ckp43m9csqxw3w57cqedqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks085c44" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsyn8vt095qxe8xmrume0lj8nkg7k6f3msetw9uxdpl64xceczyvfc4sunc4&#39;&gt;nevent1q…unc4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;So, apparently this is the &amp;#34;fix&amp;#34; for [CVE-2025-21204](&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204&lt;/a&gt; ).  Microsoft recently updated their advisory to say what the update does.&lt;br/&gt;&lt;br/&gt;Prior to everybody freaking out, the advisory for CVE-2025-21204 said nothing about what it does.&lt;br/&gt;&lt;br/&gt;Two gripes:&amp;lt;li&amp;gt;MSRC publishing content-free advisories has consequences, but they never seem to appreciate this.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;I told MSRC &amp;lt;strong&amp;gt;YEARS AGO&amp;lt;/strong&amp;gt; that they can avoid an entire class of LPE vulnerabilities in 3rd-party software &amp;lt;strong&amp;gt;and&amp;lt;/strong&amp;gt; their own software by not allowing non-admin users to be able to create directories off of &amp;lt;code&amp;gt;C:\&amp;lt;/code&amp;gt;.  They refused to make any change because it might &amp;#34;break things&amp;#34;.&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Great job, folks.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/319/275/744/743/060/original/dfdb200d561b058f.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/319/276/345/443/373/original/42bf117e3da87c7a.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-11T12:16:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfkmxych9t4uemcjtvrlnl3qu0gv0s5rua3cwenm8j0xj6fshkf4gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2k76rg</id>
    
      <title type="html">Ah, you&amp;#39;d think that you couldn&amp;#39;t. But indeed you can! ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfkmxych9t4uemcjtvrlnl3qu0gv0s5rua3cwenm8j0xj6fshkf4gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2k76rg" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsryxrdef7agxz8fch4edsxc5enk4uak6x6zuc0w0zp45le7k9jv6ggzv49d&#39;&gt;nevent1q…v49d&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Ah, you&amp;#39;d think that you couldn&amp;#39;t.&lt;br/&gt;But indeed you can!&lt;br/&gt;That is, a non-admin user can create a &amp;#34;directory&amp;#34; junction to a **file** target, which will have the result of April&amp;#39;s security updates failing to install.  😂&lt;br/&gt;&lt;br/&gt;It seems that this weird concept of a junction to a file achieves an unexpected double-standard:&amp;lt;li&amp;gt;It counts as a &amp;lt;strong&amp;gt;directory&amp;lt;/strong&amp;gt; when it comes to NTFS ACLs (a non-admin user can create a junction in &amp;lt;code&amp;gt;C:\&amp;lt;/code&amp;gt;)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Depending on how the junction is accessed, it might count as a &amp;lt;strong&amp;gt;file&amp;lt;/strong&amp;gt; as opposed to being treated as a directory.&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;This seems like a problem. Obviously in the case of April&amp;#39;s updates here. But perhaps even more generically in that a junction to a file target seems to almost guarantee unexpected behavior.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/468/118/374/963/original/117737951bd66c59.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/468/098/079/634/original/231bb5eedc25ad85.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/494/751/134/719/original/1f3da3b5b4a3c3d9.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/468/576/264/239/original/637c727e33bcbaa2.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-10T20:26:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf9wmceqx40avnlus2a3tu64flf2azy37y3pfml4j6fd76gscs4rqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkse3zwdu</id>
    
      <title type="html">Just to be clear, while mklink /h can itself be used by a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf9wmceqx40avnlus2a3tu64flf2azy37y3pfml4j6fd76gscs4rqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkse3zwdu" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf9d7jkx43p7n5ygc7up8dq6mm8t8t24004kk063rsufthjuns0xsdh6lu7&#39;&gt;nevent1q…6lu7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Just to be clear, while mklink /h can itself be used by a non-admin user, that same non-admin user would not be able to create a hard link in C:\ as that would be the same as creating a file there. Which non-admin users can&amp;#39;t do.
    </content>
    <updated>2025-04-10T19:58:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdhuatehztkt6l0gl2937rarmhha287yk4paxyvqs3fyapqcylk6qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2z3zp3</id>
    
      <title type="html">You can? Non-admin users don&amp;#39;t have ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdhuatehztkt6l0gl2937rarmhha287yk4paxyvqs3fyapqcylk6qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2z3zp3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxlrkjd2ufx9h787fcj4mltstfwz22asv8d5n25g42rw2pseyfaegttl7sk&#39;&gt;nevent1q…l7sk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;You can?&lt;br/&gt;Non-admin users don&amp;#39;t have SeCreateSymbolicLinkPrivilege, so I don&amp;#39;t believe you.  😀&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/339/916/620/405/original/0ac365f918db7466.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-10T19:35:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs07ykxcujsn4290w3x5vemlzf69cahjg53v952qs0dda3lawvg8sqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksq7slqa</id>
    
      <title type="html">Ah, that&amp;#39;d do it! But at the same time, creating files in the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs07ykxcujsn4290w3x5vemlzf69cahjg53v952qs0dda3lawvg8sqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksq7slqa" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszrh8u9zftzcmc445gn9f262hhsy7wtep6h0j3e5djjcwgxfty5tsdjpyum&#39;&gt;nevent1q…pyum&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Ah, that&amp;#39;d do it!&lt;br/&gt;But at the same time, creating files in the root directory requires admin privileges.&lt;br/&gt;And if you&amp;#39;re a trigger-happy admin, there are plenty of footguns that you can use.  🤷‍♂️&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/306/010/556/017/original/4edcd62c718580ca.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/312/018/694/860/original/c76890f4e4d646cb.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-10T19:28:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsykzxjflt7cavm4grtesvmlrs3veu3s5v3290mxvwa3xh6wccmq0qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2pjdsm</id>
    
      <title type="html">Specifically, I&amp;#39;ve seen all April updates install even when ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsykzxjflt7cavm4grtesvmlrs3veu3s5v3290mxvwa3xh6wccmq0qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks2pjdsm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsguh30j3k55wa05un3e37fm5uu9n2w8lkh3ntehr3yfhxygzd34hsv5n362&#39;&gt;nevent1q…n362&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Specifically, I&amp;#39;ve seen all April updates install even when C:\inetpub exists ahead of time.&lt;br/&gt;&lt;br/&gt;I should have known better than to attribute the correlation of C:\inetpub in a VM  before updates to the causation of a failed update.&lt;br/&gt;&lt;br/&gt;What happens with C:\inetpub is tough to see, as it either happens before the Procmon boot driver loads, or Procmon is otherwise foiled by the updates occurring. But either way, there&amp;#39;s a bit of a blind spot between pre-reboot C:\inetpub not being there and it being there post-reboot.  A Procmon boot log sees nothing.  😕&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/085/369/818/791/original/2e70f29df7d7ed13.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/315/096/002/788/236/original/c73ec6e4493404ac.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-10T18:32:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqphnjz8zv4dejedkcqmwyh98dwhqhp5ernuchqcx0nmkecf3dlwczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksnm648s</id>
    
      <title type="html">If IIS is truly installed, KB5057589 installs fine. Presumably ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqphnjz8zv4dejedkcqmwyh98dwhqhp5ernuchqcx0nmkecf3dlwczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksnm648s" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspd45xvx8e486wz9zgrew88043685xprqtcd334zzcvuf35mmhegc3y3ajp&#39;&gt;nevent1q…3ajp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If IIS is truly installed, KB5057589 installs fine.&lt;br/&gt;Presumably the failed installation is due to unexpected permissions on C:\inetpub?
    </content>
    <updated>2025-04-10T15:37:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfmr84uvjlhna2dkzx9awd0xs3l0j0m87f2myejxsvyxfu5cgxmnqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksa68xr6</id>
    
      <title type="html">Yeah, so this is interesting. I was skeptical, but I can confirm ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfmr84uvjlhna2dkzx9awd0xs3l0j0m87f2myejxsvyxfu5cgxmnqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksa68xr6" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs888ua5mmnvf6m28f23cg76amhdm6r7p5wyjn23edgvggprx9dnsc2qkqh2&#39;&gt;nevent1q…kqh2&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yeah, so this is interesting. I was skeptical, but I can confirm that [KB5057589](&lt;a href=&#34;https://support.microsoft.com/en-us/topic/kb5057589-windows-recovery-environment-update-for-windows-10-version-21h2-and-22h2-april-8-2025-74bc2baa-4ac6-40d0-8dde-4a8462b8f7e7&#34;&gt;https://support.microsoft.com/en-us/topic/kb5057589-windows-recovery-environment-update-for-windows-10-version-21h2-and-22h2-april-8-2025-74bc2baa-4ac6-40d0-8dde-4a8462b8f7e7&lt;/a&gt; ) (which installs [KB5055674](&lt;a href=&#34;https://support.microsoft.com/en-us/topic/kb5055674-safe-os-dynamic-update-for-windows-10-version-21h2-and-22h2-april-8-2025-bccc4714-2dca-4d07-be7b-1f38d9eb3e5b&#34;&gt;https://support.microsoft.com/en-us/topic/kb5055674-safe-os-dynamic-update-for-windows-10-version-21h2-and-22h2-april-8-2025-bccc4714-2dca-4d07-be7b-1f38d9eb3e5b&lt;/a&gt; )) for Windows 10 will fail to install if there is a C:\inetpub directory present ahead of time, which a non-admin user can fulfill.&lt;br/&gt;&lt;br/&gt;I wouldn&amp;#39;t expect the update to be so fragile that the mere presence of a C:\inetpub directory prevents its installation. While KB5057589 is indeed listed as a &amp;#34;Security Update&amp;#34;, I can find no information of what CVE(s) it fixes.  🤔&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/314/084/290/005/673/original/1046fbf3d5631702.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/314/084/912/020/799/original/ada09b9ca13f641b.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/314/085/867/522/689/original/e8d5cf1eaac1fb90.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-10T14:17:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyn8vt095qxe8xmrume0lj8nkg7k6f3msetw9uxdpl64xceczyvfczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksa5lg9f</id>
    
      <title type="html">After installing April&amp;#39;s updates, Windows 10 and 11 systems ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyn8vt095qxe8xmrume0lj8nkg7k6f3msetw9uxdpl64xceczyvfczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksa5lg9f" />
    <content type="html">
      After installing April&amp;#39;s updates, Windows 10 and 11 systems now have an empty C:\inetpub directory.&lt;br/&gt;&lt;br/&gt;This seems... unexpected?&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/308/855/978/617/969/original/add7da11cee02475.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-09T16:05:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw3swtaf6zlrdfk4qyz039vysju9ahj898jq62mu8lrn5lqtlsycczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmyfu4d</id>
    
      <title type="html">Vulnerability thoughts:&amp;lt;li&amp;gt;Most attacks these days rely on ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw3swtaf6zlrdfk4qyz039vysju9ahj898jq62mu8lrn5lqtlsycczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmyfu4d" />
    <content type="html">
      Vulnerability thoughts:&amp;lt;li&amp;gt;Most attacks these days rely on &amp;lt;strong&amp;gt;chains&amp;lt;/strong&amp;gt; of vulnerabilities.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Things that get CVSS scores are almost exclusively CVEs, which are &amp;lt;strong&amp;gt;individual&amp;lt;/strong&amp;gt; vulnerabilities.&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;It&amp;#39;s the vulnerability chains that matter, but the numbers that people are looking at are the individual vulnerability &amp;#34;links&amp;#34;. And as a result, we ironically benefit by people **not** following the rules and assigning a CVSS for the whole chain to an individual link. Case in point:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://infosec.exchange/@wdormann/114275453831928356&#34;&gt;https://infosec.exchange/@wdormann/114275453831928356&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/308/629/954/933/414/original/6216600d2af4e4d9.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-09T15:09:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszyl7gmtklmm8u48jph6mrptflqgquzww90gg8vk0wlgjgltkp3lczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksyh53mz</id>
    
      <title type="html">Yeah, the funny/scary thing about all of this is that these ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszyl7gmtklmm8u48jph6mrptflqgquzww90gg8vk0wlgjgltkp3lczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksyh53mz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg9egpm5uum9dsnzqtynjtw3g5htr47d7skjk54yamhuqfhzlkmjsgur6cm&#39;&gt;nevent1q…r6cm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yeah, the funny/scary thing about all of this is that these recent cases were all based on &amp;#34;we saw that the device was compromised by the failed ICT test&amp;#34;&lt;br/&gt;&lt;br/&gt;That right there is evidence that the attacker was **SO BAD** that they didn&amp;#39;t even bother to **hide their tracks**. Imagine what the good ones are up to. 😂&lt;br/&gt;&lt;br/&gt;Yes, the same thing could be said for any attack, but the Ivanti case is somewhat special based on how trivial it is to subvert both the external ICT and also the factory reset process.
    </content>
    <updated>2025-04-05T12:59:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr57envhey968pegqygz76tp5e5x65ajhv9qk8krrcwnsf8mcwy3qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksz2j3xm</id>
    
      <title type="html">I mean, this would be discoverable with the dumbest of dumb HTTP ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr57envhey968pegqygz76tp5e5x65ajhv9qk8krrcwnsf8mcwy3qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksz2j3xm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9ajf75rs25pd4h6j6jwtnydntam0d6cvjhv3wvjs6wh6eg69es7sf4g8px&#39;&gt;nevent1q…g8px&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I mean, this would be discoverable with the dumbest of dumb HTTP fuzzing.&lt;br/&gt;You&amp;#39;d need to know **absolutely nothing** about the target app or what it expects.
    </content>
    <updated>2025-04-04T18:57:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr54ed5sneerf4qplwj89fs35qqwl9eqy7aqp6vfgtcnny9ymve6gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksnj3rs9</id>
    
      <title type="html">And [per the excellent folks at ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr54ed5sneerf4qplwj89fs35qqwl9eqy7aqp6vfgtcnny9ymve6gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksnj3rs9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdcqdrdxw7xv0eseh95ywsjqgeyxzfnvu2fhlc45ysp0hyptxhqxc5fvtgx&#39;&gt;nevent1q…vtgx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;And [per the excellent folks at watchTowr](&lt;a href=&#34;https://labs.watchtowr.com/is-the-sofistication-in-the-room-with-us-x-forwarded-for-and-ivanti-connect-secure-cve-2025-22457/&#34;&gt;https://labs.watchtowr.com/is-the-sofistication-in-the-room-with-us-x-forwarded-for-and-ivanti-connect-secure-cve-2025-22457/&lt;/a&gt; ), we can see what the vulnerability is:&lt;br/&gt;A stack buffer overflow in X-Forwarded-For&lt;br/&gt;&lt;br/&gt;No need to find a specific endpoint or do something clever. Simply make a web request to **anywhere** on an ICS system with a large X-Forwarded-For HTTP header and you&amp;#39;ll get a stack buffer overflow on the system.  🤦‍♂️&lt;br/&gt;&lt;br/&gt;And due to the fact that the Ivanti web server does a fork() without a corresponding exec(), we get the same memory layout every single time.&lt;br/&gt;&lt;br/&gt;Now, about Ivanti&amp;#39;s use of remediated... The function where the overflow happens just happens to have been rewritten in a way that avoids the overflow.&lt;br/&gt;&lt;br/&gt;Did Ivanti recognize the possibility of a stack buffer overflow and not recognize it as a security issue? Or did they just happen to change code to accidentally avoid the overflow (and decide to use exploit mitigations as well).&lt;br/&gt;&lt;br/&gt;You decide...&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/280/140/413/280/971/original/0ad30e70a74288ae.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/280/141/105/205/085/original/68fe07f0072d0c64.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/280/192/527/118/331/original/44446d921b84ffc5.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/280/146/260/123/934/original/dccbbd6e0aa12435.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-04T14:25:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9wzwvprgrs9em2994z3l4qp0360lh6t6msh8gk9gylq5dshfu7cgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswvt35z</id>
    
      <title type="html">There&amp;#39;s this magical thinking that the CVE ID is what gives ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9wzwvprgrs9em2994z3l4qp0360lh6t6msh8gk9gylq5dshfu7cgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswvt35z" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdey5hdfurq0udlxv84pssx6gq7y0fdgfkm0nuukaxuvwv6cw3k4smmva3v&#39;&gt;nevent1q…va3v&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;There&amp;#39;s this magical thinking that the CVE ID is what gives attackers the ability to compromise systems.&lt;br/&gt;&lt;br/&gt;If you say that your software is vulnerable but fail to assign CVEs, you&amp;#39;re only helping the **attackers**.&lt;br/&gt;&lt;br/&gt;I remember the time that Microsoft got mad at me for &amp;#34;leaking&amp;#34; one of their CVEs to the public before the update was available. As in their world, CVE IDs were for Microsoft updates. Not for identifying vulnerabilities. 🤦‍♂️&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/279/610/521/759/845/original/8f190a43dddeb82b.jpeg&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/279/610/521/686/617/original/6d2aabcc66a7daea.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-04T12:10:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdey5hdfurq0udlxv84pssx6gq7y0fdgfkm0nuukaxuvwv6cw3k4szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks27jmxa</id>
    
      <title type="html">Apparently the CVE system is for bickering. 🤷‍♂️ ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdey5hdfurq0udlxv84pssx6gq7y0fdgfkm0nuukaxuvwv6cw3k4szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks27jmxa" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvfc2yflqsahudfcenu4khva0al9la6rfptjdsrka0ch6sdc2dzpchfju8p&#39;&gt;nevent1q…ju8p&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Apparently the CVE system is for bickering. 🤷‍♂️&lt;br/&gt;&lt;a href=&#34;https://www.securityweek.com/details-emerge-on-cve-controversy-around-exploited-crushftp-vulnerability/&#34;&gt;https://www.securityweek.com/details-emerge-on-cve-controversy-around-exploited-crushftp-vulnerability/&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/279/568/311/468/701/original/c44506e0803e839c.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-04T11:58:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdcqdrdxw7xv0eseh95ywsjqgeyxzfnvu2fhlc45ysp0hyptxhqxczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkscnha0e</id>
    
      <title type="html">Now, regarding the &amp;#34;silent fix&amp;#34; of CVE-2025-22457, which ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdcqdrdxw7xv0eseh95ywsjqgeyxzfnvu2fhlc45ysp0hyptxhqxczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkscnha0e" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8k773dzrfqh43a0e5wr97e6j42augtraewngvp37v675ugq95jkcdq8hnp&#39;&gt;nevent1q…8hnp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Now, regarding the &amp;#34;silent fix&amp;#34; of CVE-2025-22457, which per Ivanti:&lt;br/&gt;&lt;br/&gt;&amp;gt; This vulnerability has been remediated in Ivanti Connect Secure 22.7R2.6 (released February 11, 2025)&lt;br/&gt;&lt;br/&gt;That word remediated...&lt;br/&gt;&lt;br/&gt;Careful readers will see that Ivanti didn&amp;#39;t **fix** the vulnerability in 22.7R2.6.&lt;br/&gt;&lt;br/&gt;What changed in 22.7R2.6? With this version, Ivanti compiled **some** of the ICS binaries with exploit mitigations that have been around for 20 years. And wouldn&amp;#39;t you know it, it paid off already?  Everybody&amp;#39;s gotta learn sometime...&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/275/552/878/380/322/original/545a16fc157c657d.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/275/562/489/795/107/original/21b3dd2357824bab.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-03T18:57:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8k773dzrfqh43a0e5wr97e6j42augtraewngvp37v675ugq95jkczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks52q97n</id>
    
      <title type="html">Given that the web server on an ICS runs as the limited nr user, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8k773dzrfqh43a0e5wr97e6j42augtraewngvp37v675ugq95jkczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks52q97n" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswp5s5dfvzmyehh3mcslggacjag0z2qkqgkn5sgw43tqhutl084js8m3s75&#39;&gt;nevent1q…3s75&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Given that the web server on an ICS runs as the limited nr user, both the Ivanti and the Mandiant advisory are missing any indication whatsoever how the threat actors are gaining root privileges.&lt;br/&gt;&lt;br/&gt;I&amp;#39;ve reported 4 different ICS LPEs to Ivanti recently, but none of them have been fixed yet.&lt;br/&gt;&lt;br/&gt;Back in the CVE-2025-0282 days, Ivanti made up a CVE-2025-0283 CVE to capture the LPE aspect of attacks happening in the wild. I say &amp;#34;made up&amp;#34; because I&amp;#39;ve seen no evidence whatsoever that any LPE was fixed between 22.7R2.5 and 22.7R2.6.&lt;br/&gt;&lt;br/&gt;Knowing what&amp;#39;s going on in an ICS device is a huge blind spot, but apparently seeing how attackers are LPE&amp;#39;ing is even blind-er.
    </content>
    <updated>2025-04-03T18:30:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswp5s5dfvzmyehh3mcslggacjag0z2qkqgkn5sgw43tqhutl084jszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmrh6rs</id>
    
      <title type="html">Ivanti CVE-2025-22457 is being exploited ITW. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswp5s5dfvzmyehh3mcslggacjag0z2qkqgkn5sgw43tqhutl084jszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmrh6rs" />
    <content type="html">
      Ivanti CVE-2025-22457 is being exploited ITW.&lt;br/&gt;&lt;a href=&#34;https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457&#34;&gt;https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Per [Mandiant](&lt;a href=&#34;https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability&#34;&gt;https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability&lt;/a&gt; ):&lt;br/&gt;&lt;br/&gt;&amp;gt; We assess it is likely the threat actor studied the patch for the vulnerability in ICS 22.7R2.6 and uncovered through a complicated process, it was possible to exploit 22.7R2.5 and earlier to achieve remote code execution.&lt;br/&gt;&lt;br/&gt;Gee, who could have imagined that attackers are looking at patches?  🤔&lt;br/&gt;&lt;br/&gt;1) This apparently was silently fixed for ICS in 22.7R2.6, as the fix for this was released in February.  Ivanti Policy Secure and ZTA gateways are expected to receive a patch in late April.&lt;br/&gt;&lt;br/&gt;2) The advisory still conveys the magical thinking if **if** your device shows signs of compromise, then you should perform a &amp;#34;factory reset.&amp;#34;  This is magical in that the [ICT won&amp;#39;t catch a compromise nor will the &amp;#34;factory reset&amp;#34; reset to factory condition if the attacker is bothering to try](&lt;a href=&#34;https://infosec.exchange/@wdormann/113805254385223581&#34;&gt;https://infosec.exchange/@wdormann/113805254385223581&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;While Mandiant also parrots the magical thinking of running the ICT tool, which I guess is the best advice if you&amp;#39;re not going to throw the device in the trash since there isn&amp;#39;t an official integrity checking tool that is sound, they do throw out a tidbit of:&lt;br/&gt;&lt;br/&gt;&amp;gt; ... and conduct anomaly detection of client TLS certificates presented to the appliance.&lt;br/&gt;&lt;br/&gt;Bets on whether CVE-2025-22457 is an overflow in the handling of a field in a client-provided certificate?  😂&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/275/335/314/017/398/original/c8817f4a63e90e8d.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-03T18:06:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstqdx974rjkwjvpsccrj4xlh09udwq4fe3n4pfv7gzu5rclk6ehmgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstavc27</id>
    
      <title type="html">FWIW, I did some testing with the eicar string in an ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstqdx974rjkwjvpsccrj4xlh09udwq4fe3n4pfv7gzu5rclk6ehmgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstavc27" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszqk9mt809vg37aa3rv5fekvry4rhsqkege78tpf8ze80m66qj5cslp3h2a&#39;&gt;nevent1q…3h2a&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;FWIW, I did some testing with the eicar string in an AES-encrypted zip (via 7-zip)&amp;lt;li&amp;gt;EICAR as &amp;lt;code&amp;gt;eicar.com&amp;lt;/code&amp;gt; : Blocked&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;EICAR as &amp;lt;code&amp;gt;hello.txt&amp;lt;/code&amp;gt; : Allowed&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;EICAR with an appended &amp;lt;code&amp;gt;A&amp;lt;/code&amp;gt; as &amp;lt;code&amp;gt;eicar.com&amp;lt;/code&amp;gt; : Blocked&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CRC32 collision as &amp;lt;code&amp;gt;eicar.com&amp;lt;/code&amp;gt;: Blocked&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CRC32 collision as &amp;lt;code&amp;gt;hello.txt&amp;lt;/code&amp;gt;: Allowed&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;So at least as of this specific test, it may be that the Gmail SMTP server is perhaps just using filenames for &amp;#34;blocking&amp;#34; the sending of mail.&lt;br/&gt;&lt;br/&gt;And again, I use scare quotes around &amp;#34;blocked&amp;#34; as while the SMTP server does say that the message was blocked &amp;#34;because its content presents a potential security issue.&amp;#34; But the email is indeed sent to the recipient., despite the warning.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/268/465/099/733/873/original/a728f1552bfe07a2.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-02T12:53:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9s4wqqe89t2t2lplsavmfdyef2xjwfc367re0nstpc0h705jza7qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks63dksk</id>
    
      <title type="html">But why would the EICAR string with the file name wd.txt get ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9s4wqqe89t2t2lplsavmfdyef2xjwfc367re0nstpc0h705jza7qzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks63dksk" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxc0pchpt4eq9kxfn6v5fz4s4tdr8fxrp8pmwrgzwltatauv5tu2cdj3z9s&#39;&gt;nevent1q…3z9s&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;But why would the EICAR string with the file name wd.txt get blocked in an encrypted (password-protected) ZIP?
    </content>
    <updated>2025-04-02T04:40:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2ha85yd52rqxvqh79gkgeylj9huu0jh4qt0k974sxcgeazc9fj3gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmsfnlz</id>
    
      <title type="html">FWIW, I generated a file with the same size and CRC32 as ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2ha85yd52rqxvqh79gkgeylj9huu0jh4qt0k974sxcgeazc9fj3gzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksmsfnlz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvrevhksrqr4kurxdnyw59243tjwxz3qrpwaanggv3dj2dqeafvpcwse5gw&#39;&gt;nevent1q…e5gw&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;FWIW, I generated a file with the same size and CRC32 as eicar.com and put it in a password-protected ZIP file and the Gmail SMTP server didn&amp;#39;t complain a bit.  🤔
    </content>
    <updated>2025-04-02T02:37:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst69nd5dhqautxtm9gk36myhvu477hq83c7jenywpt8r73axjh4nczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksu0eqzm</id>
    
      <title type="html">Actually, after some further tests:&amp;lt;li&amp;gt;The Info-ZIP that ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst69nd5dhqautxtm9gk36myhvu477hq83c7jenywpt8r73axjh4nczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksu0eqzm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0vtpmgyh683m2j2psp5xjchksf2v9nd2u7lwu7dxwq72ve7l250se2n2yv&#39;&gt;nevent1q…n2yv&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Actually, after some further tests:&amp;lt;li&amp;gt;The Info-ZIP that comes with macOS creates an encrypted ZIP &amp;lt;strong&amp;gt;1.0&amp;lt;/strong&amp;gt; archive, and is reported to be blocked by Gmail SMTP.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;The same encrypted ZIP from 7-zip using &amp;#34;ZipCrypto&amp;#34;, or AES encryption is also reported to be blocked by Gmail SMTP.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;I say &amp;#34;reported to be blocked&amp;#34; as while the Gmail SMTP server gives me this warning saying that the sending of the message failed, it actually &amp;lt;strong&amp;gt;does&amp;lt;/strong&amp;gt; send the message.  But seemingly delayed slightly.  🤦‍♂️&amp;lt;/li&amp;gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/265/211/899/449/690/original/9e6f53a0df92f20f.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-01T23:15:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0esl7sxpsvngp7p5nt8ar7ey9w85xgknjkf0frfqztz88flx8eeczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksgh3kzy</id>
    
      <title type="html">CRC32 isn&amp;#39;t enough to uniquely identify files. There&amp;#39;d be ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0esl7sxpsvngp7p5nt8ar7ey9w85xgknjkf0frfqztz88flx8eeczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksgh3kzy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8xhqkye44dw86zxdpza5vwp4xd9nf0ktc2mwelcaxyeqnm8yfqfsp4ez8s&#39;&gt;nevent1q…ez8s&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;CRC32 isn&amp;#39;t enough to uniquely identify files.  There&amp;#39;d be too many false positives due to collisions, IMO.
    </content>
    <updated>2025-04-01T23:11:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0vtpmgyh683m2j2psp5xjchksf2v9nd2u7lwu7dxwq72ve7l250szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksek7km2</id>
    
      <title type="html">Ah, good guess! Using standard zip encryption with an unguessable ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0vtpmgyh683m2j2psp5xjchksf2v9nd2u7lwu7dxwq72ve7l250szypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksek7km2" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsw37lkumqs2cv6hj5vhnwrc70gpytes8qwkv0qm39eucypcd88s9sdjt4pk&#39;&gt;nevent1q…t4pk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Ah, good guess!&lt;br/&gt;&lt;br/&gt;Using standard zip encryption with an unguessable password not in the message body:&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;&amp;amp;lt;eicar string&amp;amp;gt;&amp;lt;/code&amp;gt; as &amp;lt;code&amp;gt;eicar.com&amp;lt;/code&amp;gt;: Blocked&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;hi&amp;lt;/code&amp;gt; as &amp;lt;code&amp;gt;hi.txt&amp;lt;/code&amp;gt;: Allowed&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;&amp;amp;lt;eicar string&amp;amp;gt;&amp;lt;/code&amp;gt; as &amp;lt;code&amp;gt;wd.txt&amp;lt;/code&amp;gt;: Blocked&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Were it not for the last case, I&amp;#39;d assume that somehow the combination of encrypted &#43; suspicious filename = Block. But that last case...&lt;br/&gt;I&amp;#39;m at a complete loss as for how the EICAR string as wd.txt in an encrypted ZIP file is blocked.  🤷‍♂️
    </content>
    <updated>2025-04-01T22:38:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs24n3zkk3eadnr73x2fw80ufztm9r23r7jex0qrql67r75706uucgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswj4c2x</id>
    
      <title type="html">I didn&amp;#39;t investigate much further, but I suspect that ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs24n3zkk3eadnr73x2fw80ufztm9r23r7jex0qrql67r75706uucgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkswj4c2x" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2l6uuxy087qt9rnrj077y33pef8amyyrggjcumg90n0d8t5hty6cul750f&#39;&gt;nevent1q…750f&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I didn&amp;#39;t investigate much further, but I suspect that Gmail&amp;#39;s SMTP server will attempt a list of known passwords, plus each word that exists in the email itself to decrypt encrypted ZIP files that are attached.
    </content>
    <updated>2025-04-01T17:59:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswa26hwyad0pqz0cgxj5tu27tjh72z94svm0xsrafmcfuyghgtzaqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkslwrjq8</id>
    
      <title type="html">Yeah, even with a number of different ZIP passwords, I found that ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswa26hwyad0pqz0cgxj5tu27tjh72z94svm0xsrafmcfuyghgtzaqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkslwrjq8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsws0krfrrstnmeztdqx67d4ng00j2ncspnekw7zhmyege6ezwtpyg3097qk&#39;&gt;nevent1q…97qk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yeah, even with a number of different ZIP passwords, I found that Gmail&amp;#39;s SMTP server still found the evil inside if I didn&amp;#39;t use PGP encryption at the higher layer.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/263/976/042/780/469/original/87d57216a4fab70e.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-01T17:52:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz638cm2kenh2nu5w9gzx75xkksn5gtt8nswhu8zpet3m60zcvqkqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkskvyfud</id>
    
      <title type="html">I did have an AV vendor recently request my EICAR-containing PoC ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz638cm2kenh2nu5w9gzx75xkksn5gtt8nswhu8zpet3m60zcvqkqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkskvyfud" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsz3dpyqs7xqsjkt8jrvyfv2tzzg9x58r8s8e74wnzvekydy3e2m0q68ut2p&#39;&gt;nevent1q…ut2p&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I did have an AV vendor recently request my EICAR-containing PoC in a password-protected ZIP file in my already-PGP-encrypted email.&lt;br/&gt;Presumably their workflow for handling encrypted emails automatically deleted my PoC.  😂
    </content>
    <updated>2025-04-01T17:23:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf34rf6qa55vzew6kt7jq5z8xqktujl5x46tx2euv4zfch7qcwhjgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksdhrgnk</id>
    
      <title type="html">I mean, when they refused to accept my video on YouTube, they ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf34rf6qa55vzew6kt7jq5z8xqktujl5x46tx2euv4zfch7qcwhjgzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksdhrgnk" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdjswx29t46d72zs239ngdj3g9jjj7lqf8xg9e58ewfm0ehpmk8yc4cfekl&#39;&gt;nevent1q…fekl&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I mean, when they refused to accept my video on YouTube, they **did** tell me to upload the video to OneDrive, which could end up costing me money depending on my quota.  😂
    </content>
    <updated>2025-04-01T17:17:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8enj8kmtr0l9y9sz4d4av922e2p0qu6927344856d3lkuqn67lpqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks5z6alm</id>
    
      <title type="html">One of the 3 vulnerabilities that I&amp;#39;ve outlined is that the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8enj8kmtr0l9y9sz4d4av922e2p0qu6927344856d3lkuqn67lpqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks5z6alm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8ke6jusum75v4atg3uph64dz7h3ypdc0v9jt50rmsxql7adcqznsjdryd4&#39;&gt;nevent1q…ryd4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;One of the 3 vulnerabilities that I&amp;#39;ve outlined is that the on-endpoint driver blocklist is a differently-maintained list than the [online list](&lt;a href=&#34;https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules&#34;&gt;https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules&lt;/a&gt; ).&lt;br/&gt;Am I being pedantic and nit-picking here?&lt;br/&gt;&lt;br/&gt;Per MSRC, the discrepancy is intentional:&lt;br/&gt;&lt;br/&gt;&amp;gt; Lastly, regarding the Online Driver Blocklist, the online list is supposed to be a superset&lt;br/&gt;&lt;br/&gt;Let&amp;#39;s say that theoretically this is not a lie...&lt;br/&gt;1) How well known is it that the online Microsoft recommended driver block rules list is **intentionally** a superset of what endpoints see?  The language in the online blocklist clearly says that **the** blocklist gets put on endpoints via Windows Update.  🤔&lt;br/&gt;&lt;br/&gt;2) Let&amp;#39;s pick a sample driver used by the years-old exploit [KDU](&lt;a href=&#34;https://github.com/hfiref0x/KDU&#34;&gt;https://github.com/hfiref0x/KDU&lt;/a&gt; ). Driver number 1 provided by this tool is [RTCore64.sys](&lt;a href=&#34;https://www.loldrivers.io/drivers/e32bc3da-4db1-4858-a62c-6fbe4db6afbd/&#34;&gt;https://www.loldrivers.io/drivers/e32bc3da-4db1-4858-a62c-6fbe4db6afbd/&lt;/a&gt; )&lt;br/&gt;This driver is definitely in the online Microsoft recommended driver block rules list. Let&amp;#39;s test it out in a Windows 11 with the &amp;#34;Microsoft Vulnerable Driver Blocklist&amp;#34; option enabled.&lt;br/&gt;Oh... it loads?  And it allows us to disable driver signature verification?&lt;br/&gt;This seems less than ideal.&lt;br/&gt;&lt;br/&gt;Tell me, oh internet public, why might Microsoft intentionally choose to allow a years-old public exploit to continue to work?&lt;br/&gt;&lt;br/&gt;Oh, right.  It&amp;#39;s easier to blow off a researcher with a &amp;#34;this is intentional&amp;#34; as opposed to actually read the report that they submitted and address the problem.  🤦‍♂️&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/263/831/243/704/491/original/9698eeaa0dc836cb.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/263/763/706/131/252/original/1f8af87742e4dfa7.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/263/774/009/521/212/original/b853179446315e81.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-01T17:04:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvfc2yflqsahudfcenu4khva0al9la6rfptjdsrka0ch6sdc2dzpczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks3ng9rz</id>
    
      <title type="html">In today&amp;#39;s episode of drama in the CVE ecosystem: The ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvfc2yflqsahudfcenu4khva0al9la6rfptjdsrka0ch6sdc2dzpczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rks3ng9rz" />
    <content type="html">
      In today&amp;#39;s episode of drama in the CVE ecosystem:&lt;br/&gt;&lt;br/&gt;The Canonical CNA created [CVE-2025-0927](&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0927&#34;&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0927&lt;/a&gt; ) and an [associated advisory](&lt;a href=&#34;https://ubuntu.com/security/CVE-2025-0927&#34;&gt;https://ubuntu.com/security/CVE-2025-0927&lt;/a&gt; ) for a heap overflow in HFS&#43; in the Linux kernel.&lt;br/&gt;&lt;br/&gt;The Linux kernel CNA stripped out the information (like the reporter of Attila Szász, useful references, etc) from the CVE entry and added the passive-aggressive:&lt;br/&gt;&lt;br/&gt;&amp;gt; The Linux kernel CVE team has been assigned CVE-2025-0927 as it was incorrectly created by a different CNA that really should have known better to not have done this.to this issue. [sic]&lt;br/&gt;&lt;br/&gt;Also TIL: If you look only at the assignerShortName in a cvelistV5 CVE entry, you might not get the whole picture of whose CVE it technically is. While the Linux kernel rewrote history to claim that **they** assigned the CVE, that was only done via the cna container&amp;#39;s ProviderMetadata shortName value. The top-level [assignerShortName](&lt;a href=&#34;https://github.com/CVEProject/cvelistV5/blob/main/cves/2025/0xxx/CVE-2025-0927.json#L7&#34;&gt;https://github.com/CVEProject/cvelistV5/blob/main/cves/2025/0xxx/CVE-2025-0927.json#L7&lt;/a&gt;) for the entry still shows canonical.&lt;br/&gt;&lt;br/&gt;Good times...&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/257/381/114/219/227/original/3812831817c8bd89.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/257/431/435/673/328/original/f86fe742deac6337.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/257/433/764/597/291/original/8cafd467d7c4c038.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-03-31T14:09:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9s24rp2rykrj5mk0ursrt7nkkj0jqzt0cg8pxtydtst2mypsndeqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksuz9gzt</id>
    
      <title type="html">I can&amp;#39;t quite put my finger on it, but something about this ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9s24rp2rykrj5mk0ursrt7nkkj0jqzt0cg8pxtydtst2mypsndeqzypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksuz9gzt" />
    <content type="html">
      I can&amp;#39;t quite put my finger on it, but something about this current administration makes me think that they&amp;#39;re not putting their best efforts into things.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/255/179/276/930/717/original/ace3949c3b8883d2.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-03-31T04:35:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9ykctsckpw722ggtpra6yx257a4n8ehxavwsa582ugqg4whunspczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstnamxa</id>
    
      <title type="html">The prior [CISA Cybersecurity ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9ykctsckpw722ggtpra6yx257a4n8ehxavwsa582ugqg4whunspczypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rkstnamxa" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspuh7sjtk2xv8w4y8hyklr3j83xtlcvxyu6af843lldqm082xph9skxlxpu&#39;&gt;nevent1q…lxpu&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The prior [CISA Cybersecurity Advisory](&lt;a href=&#34;https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b&#34;&gt;https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b&lt;/a&gt; ) minces words a bit less than the recent MAR.&lt;br/&gt;&lt;br/&gt;The ICT (internal or external) may not detect compromise. The threat actor may retain persistence after &amp;#34;factory reset&amp;#34;.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/247/911/250/770/588/original/c1b32239b85daca5.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-03-29T21:47:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfzmfgtc20q8c0wzcamtjyelasr7ecpv6vwgj2ahdjrskltlxxxcszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksrfxvda</id>
    
      <title type="html">Broadcom has determined a way to get more money out of VMware ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfzmfgtc20q8c0wzcamtjyelasr7ecpv6vwgj2ahdjrskltlxxxcszypg6uyqfu3qrmqslc8qju99lfdqdu3x8m3sh0zvggr9pa70ea0rksrfxvda" />
    <content type="html">
      Broadcom has determined a way to get more money out of VMware licensing:&lt;br/&gt;&lt;br/&gt;&amp;gt; If a customer has a single-processor server with 8 cores, VMware by Broadcom will license 72 cores.&lt;br/&gt;&lt;br/&gt;😂&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/245/831/989/747/827/original/5ed1a738613c50e3.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-03-29T12:57:47Z</updated>
  </entry>

</feed>