
Steve
18K posts

Steve
@Northvein
Hacker in corpo #infosec trying to secure the future | Founded DC151 & BSidesLeeds | #PurpleTeam / CTI / #TabletopTuesday


⚠️ FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as Root Source: cybersecuritynews.com/freebsd-dhcp-c… The FreeBSD Project has released a critical security advisory addressing a severe flaw in its default IPv4 DHCP client. Tracked as CVE-2026-42511, this vulnerability allows a local network attacker to execute arbitrary code as root, granting them complete control over the compromised machine. The core issue resides in how dhclient(8) processes network configuration parameters from DHCP servers. When a device joins a network, it requests IP configuration data. The DHCP client takes the provided BOOTP file field and writes it to a local DHCP lease file. #cybersecuritynews


any sufficiently advanced engineering is indistinguishable from art




I've been saying this about Mythos for a while now -- sarcastically. Bugs aren't finite, but there is "decreasing marginal returns", they get harder and harder to find. Each AI model makes it increasingly easy find bugs. I suspect the two cancel out, and hence, we keep finding bugs at the same rate as before.

Last night Ben Sasse confirmed my suspicion that Dr. Santiago Schnell, provost at Dartmouth, is quickly becoming the single most influential voice in higher education. If you haven’t already read his essay on AI that broke the internet you should. “AI has not created new educational problems; it has made old ones impossible to ignore. The habit of rewarding performance over understanding, fluency over depth, and polish over genuine engagement was already present in our institutions before the first language model was trained. AI simply industrializes and accelerates those habits until their emptiness becomes undeniable…” ncregister.com/commentaries/s…

Do not design systems assuming privilege escalation is hard. It never was. Anything local can become root. Every OS has had trivial privesc bugs, and any serious attacker keeps a few. Treat user separation as hygiene; not security. Disposable instances, minimal persistence.

🚨: Eight Marines outsmarted a DARPA AI meant to spot people. Two somersaulted 300 meters, two snuck under a cardboard box, and one pretended to be a tree—and the AI missed them all, because it was trained to catch people walking.




JUST IN: OpenAI is reportedly developing a smartphone designed to "make apps obsolete" by replacing them with AI agents.

🚨#BREAKING: According to reports, a Claude powered coding agent using the Cursor tool allegedly went rogue, wiping a company’s production database along with its backups in just 9 seconds, raising serious concerns








