Patrick

Software Engineer originally from Tennessee now living in Virginia. Been #Coding for well over a decade, primarily in the .Net world, but also some Flutter and Ruby. I enjoy #gaming, #SteamDeck, #Disney, #StarWars, #StarTrek, and #SciFi (not in a particular order).

#videogames
#playstation
#nintendo
#xbox
#programming
#technology
#apple
#microsoft
#linux
#privacy
#infosec
#nixos
#homeserver
#blog

Backup Mastadon Account: @ppb1701@infosec.exchange

Patrick
ppb1701@ppb.social

Microsoft rebuilt Windows Recall from scratch. A researcher broke it again in a few weeks. Microsoft's response: that's not a vulnerability.

https://blog.ppb1701.com/the-zombie-that-wont-stay-dead

#microsoft #windows #security #recall #ai #copilot #userhostile #bigtech #blog #infosec

5 hours ago
ppb1701 shared a status by stux
stux⚡️
stux@mstdn.social

RE: https://flipboard.social/@TechDesk/116415287153075804

How can a federated network be down?

Oh wait 😆

13 hours ago
Patrick
ppb1701@ppb.social
7 hours ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

New. There's more, but this is getting too long.

Zscaler: Payouts King Takes Aim at the Ransomware Throne https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne

Picus: CVE-2026-21643: Critical SQL Injection in Fortinet FortiClient EMS Exploited in the Wild https://www.picussecurity.com/resource/blog/cve-2026-21643-critical-sql-injection-in-fortinet-forticlient-ems-exploited-in-the-wild

Microsoft: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/

Sohos: QEMU abused to evade detection and enable ransomware delivery https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery @SophosXOps

Sekoia: From APT28 to RePythonNET: automating .NET malware analysis https://blog.sekoia.io/apt28-to-repythonnet-automating-net-malware-analysis/ @sekoia_io

Proopoint: Beyond the breach: inside a cargo theft actor’s post-compromise playbook https://www.proofpoint.com/us/blog/threat-insight/beyond-breach-inside-cargo-theft-actors-post-compromise-playbook

Group-IB: W3LL Unmasked https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/

Posted yesterday:

Halcyon: 44% and Rising: What the Automotive Industry's Ransomware Problem Tells Us About Where Attacks Are Heading https://www.halcyon.ai/blog/44-percent-and-rising-automotive-ransomware #infosec #threatresearch #ransomware #threatintel #threatintelligence #Python #Fortinet #SQL #Apple #macOS #Microsoft #cybercrime

13 hours ago
ppb1701 shared a status by jon
Jon S. von Tetzchner
jon@social.vivaldi.net

32 years ago I started working on my first browser, Opera. I left Opera in 2011, but two years later I co-founded Vivaldi. Thus I have been making browsers now for 32 years, with a short break there between 2011 and 2013.

I have always felt that this work is important and no less today than before as more and more of you see the importance of alternatives to Big Tech.

Vivaldi is a European company with headquarters in Norway, servers in Iceland and team in Norway, Iceland, across Europe, Japan and a couple in the US.

We try our best to adapt to your needs. We build powerful browsers, with a lot of flexibility.

I welcome you to try us out and share with your friends!

#Windows #Macos #Linux #Android #iOS #TEchnology #EU #Europa #Norway #Iceland #Browser #Vivaldi #BigTech

https://vivaldi.com

15 hours ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

Don't count on any privacy with this. Your pictures say a lot more about you than you know.

Endgadget: Gemini can now draw on your Google data to personalize the images it generates https://www.engadget.com/ai/gemini-can-now-draw-on-your-google-data-to-personalize-the-images-it-generates-160000269.html @Engadget #Google #Gemini #privacy

12 hours ago
ppb1701 shared a status by beep
beep
beep@piefed.world

Hacking the EU Age Verification app in under 2 minutes.

During setup, the app asks you to create a PIN. After entry, the app encrypts it and saves it in the shared_prefs directory.

  1. It shouldn’t be encrypted at all - that’s a really poor design.
  2. It’s not cryptographically tied to the vault which contains the identity data.

So, an attacker can simply remove the PinEnc/PinIV values from the shared_prefs file and restart the app.

After choosing a different PIN, the app presents credentials created under the old profile and let’s the attacker present them as valid.

Other issues:

  1. Rate limiting is an incrementing number in the same config file. Just reset it to 0 and keep trying.
  2. “UseBiometricAuth” is a boolean, also in the same file. Set it to false and it just skips that step.

Seriously von der leyen - this product will be the catalyst for an enormous breach at some point. It’s just a matter of time. . Von Der Leyen “The European Age Verification app is technically ready. It respects the highest privacy standards in the world. It’s open-source, so anyone can check the code…”

I did. It didn’t take long to find what looks like a serious privacy issue.

The app goes to great lengths to protect the AV data AFTER collection (is_over_18: true is AES-GCM’d); it does so pretty well.

But, the source image used to collect that data is written to disk without encryption and not deleted correctly.

For NFC biometric data: It pulls DG2 and writes a lossless PNG to the filesystem. It’s only deleted on success. If it fails for any reason (user clicks back, scan fails & retries, app crashes etc), the full biometric image remains on the device in cache. This is protected with CE keys at the Android level, but the app makes no attempt to encrypt/protect them.

For selfie pictures: Different scenario. These images are written to external storage in lossless PNG format, but they’re never deleted. Not a cache… long-term storage. These are protected with DE keys at the Android level, but again, the app makes no attempt to encrypt/protect them.

This is akin to taking a picture of your passport/government ID using the camera app and keeping it just in case. You can encrypt data taken from it until you’re blue in the face… leaving the original image on disk is crazy & unnecessary.

From a GDPR standpoint: Biometric data collected is special category data. If there’s no lawful basis to retain it after processing, that’s potentially a material breach.

YouTube Video.

Source: Paul Moore(Security Consultant) X/Twitter, 2.

Bypassing EU Age Verification using their own infrastructure.

Video.

I’ve ported the Android app logic to a Chrome extension - stripping out the pesky step of handing over biometric data which they can leak… and pass verification instantly.

Step 1: Install the extension Step 2: Register an identity (just once) Step 3: Continue using the web as normal

The extension detects the QR code, generates a cryptographically identical payload and tells the verifier I’m over 18, which it “fully trusts”.

This isn’t a bug… it’s a fundamental design flaw they can’t solve without irrevocably tying a key to you personally; which then allows tracking/monitoring.

Of course, I could skip the enrolment process entirely and hard-code the credentials into the extension… and the verifier would never know.

Source: Paul Moore(Security Consultant) X/Twitter.

12 hours ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

The research was published yesterday:

Manifold: Two Git Commands Fooled Claude Into Merging Malicious Code https://www.manifold.security/blog/spoofed-git-identity-ai-code-reviewer @axsharma

"Forged metadata made AI reviewer treat hostile changes as though they came from known maintainer."

The Register: Git identity spoof fools Claude into giving bad code the nod https://www.theregister.com/2026/04/16/git_identity_spoof_claude/ @theregister @carlypage #Anthropic #Claude #GitHub

14 hours ago
ppb1701 shared a status by jcrabapple
jcrabapple
jcrabapple@dmv.community

Faster-Than-Light Travel: What's Actually Possible in 2026

https://hermez.prose.sh/FTL%20Travel%20-%202026

14 hours ago
ppb1701 shared a status by ppb1701
Patrick
ppb1701@ppb.social

Big Tech preaches privacy. Meanwhile the signal that says 'do not track' arrives at their servers and they issue a two-year cookie in response.

https://blog.ppb1701.com/read-receipt

#gpc #privacy #ccpa #cookies #google #meta #microsoft #userhostile #bigtech #blog

1 day ago
Patrick
ppb1701@ppb.social

@jcrabapple mornin'

16 hours ago
Patrick
ppb1701@ppb.social

Big Tech preaches privacy. Meanwhile the signal that says 'do not track' arrives at their servers and they issue a two-year cookie in response.

https://blog.ppb1701.com/read-receipt

#gpc #privacy #ccpa #cookies #google #meta #microsoft #userhostile #bigtech #blog

1 day ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

PC Gamaer: Apple rubberstamps an open source driver to allow Nvidia GPUs to run on Macs, though gaming isn't on the table just yet https://www.pcgamer.com/hardware/graphics-cards/apple-rubberstamps-an-open-source-driver-to-allow-nvidia-gpus-to-run-on-macs-though-gaming-isnt-on-the-table-just-yet/ #Apple #Nvidia #opensource

1 day ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

It's like a bad dream that keeps coming back.

"My research shows that the vault is real, but the trust boundary ends too early.”

"The fundamental problem isn’t the crypto, the enclave, the authentication, or the PPL. It’s sending decrypted content to an unprotected process for rendering."

PC Gamer: Cybersecurity experts raise the alarm over Windows Recall again: 'The vault door is titanium. The wall next to it is drywall' https://www.pcgamer.com/software/security/cybersecurity-experts-raise-the-alarm-over-windows-recall-again-the-vault-door-is-titanium-the-wall-next-to-it-is-drywall/ #Microsoft #Windows #Recall #infosec

1 day ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

PC Gamer: 'In 10 years of tracking retail CPU sales, I have never seen such a steep decline,' says one tech channel after staring at the grim figures https://www.pcgamer.com/hardware/processors/in-10-years-of-tracking-retail-cpu-sales-i-have-never-seen-such-a-steep-decline-says-one-tech-channel-after-staring-at-the-grim-figures/ #AMD #Intel

1 day ago
ppb1701 shared a status by Techmeme
Techmeme
Techmeme@techhub.social

A jury finds that Live Nation and Ticketmaster illegally maintained monopoly power in the ticketing market, in a case brought by state AGs after the DOJ settled (NBC News)

https://www.nbcnews.com/business/consumer/livenation-illegally-monopolized-ticketing-market-jury-antitrust-trial-rcna273714
http://www.techmeme.com/260415/p39#a260415p39

1 day ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

Dell has three high-severity advisories today:

- CVE-2026-23772: Security Update for Dell Storage Manager - Replay Manager for Microsoft Servers Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000453020/dsa-2026-058-security-update-for-dell-storage-manager-replay-manager-for-microsoft-servers-vulnerabilities

- Several CVEs: Security Update for Dell Connectrix B-Series SANnav Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000453015/dsa-2026-171-security-update-for-dell-connectrix-b-series-sannav-vulnerabilities

- Several CVEs: Security Update for Dell Secure Connect Gateway Policy Manager Multiple Third-Party Component Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000441138/dsa-2026-120-security-update-for-dell-secure-connect-gateway-policy-manager-multiple-third-party-component-vulnerabilities #Dell #infosec #vulnerability

1 day ago
ppb1701 shared a status by FlutterComm
Flutter Community :va:
FlutterComm@fluttercommunity.social

🔴 #HumpdayQandA and Live Coding! in 30 minutes at 5pm BST / 6pm CEST / 9am PDT today! Answering your #Flutter and #Dart questions with @simon, Randal, Danielle, John and Matthew Jones (Makerinator)

https://www.youtube.com/watch?v=scQkSTyzcPI

1 day ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

New.

Pluto Security: MCPwn: A CVSS 9.8 One-Line MCP Bug That Hands Over Your Nginx to Anyone on the Network – Actively Exploited in the Wild https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/

More:

Security Week: Exploited Vulnerability Exposes Nginx Servers to Hacking https://www.securityweek.com/exploited-vulnerability-exposes-nginx-servers-to-hacking/ @SecurityWeek #infosec #vulnerability

1 day ago
ppb1701 shared a status by AAKL
AA
AAKL@infosec.exchange

OX Security: Anthropic's "By Design" Failure at the Heart of the AI Ecosystem https://20204725.hs-sites.com/the-mother-of-all-ai-supply-chains

More:

Security Week: Report: ‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks https://www.securityweek.com/by-design-flaw-in-mcp-could-enable-widespread-ai-supply-chain-attacks/ @SecurityWeek #Anthropic #vulnerability #infosec #LLM #threatresearch

1 day ago