Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: root Clear Filter

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’

The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor’s high-speed Internet connection in the United States. This post examines the history and provenance of DSLRoot, one of the oldest “residential proxy” networks with origins in Russia and Eastern E

DSLRoot, Proxies, and the Threat of 'Legal Botnets'

The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor’s high-speed Internet connection in the United States. This post examines the history and provenance of DSLRoot, one of the oldest “residential proxy” networks with origins in Russia and Eastern E

Virtual Linux Devices on ARM64

500 virtual Linux devices on ARM 64 Underjord is an artisanal consultancy doing consulting in Elixir, Nerves with an accidental speciality in marketing and outreach. If you like the writing you should really try the pro version. This is the first part of an experimental journey as I explore how many instances of my favorite IoT framework I can run on the 192 core Ampere One. Background I work on the Nerves project which is an IoT framework providing best-practice underpinnings and support so

Zero-day flaws in authentication, identity, authorization in HashiCorp Vault

Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your infrastructure is already lost. Driven by the understanding that vaults are high-value targets for attackers, our research team at Cyata set out to conduct

Cracking the Vault: How we found zero-day flaws in HashiCorp Vault

Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your infrastructure is already lost. Driven by the understanding that vaults are high-value targets for attackers, our research team at Cyata set out to conduct

Show HN: TraceRoot – Open-source agentic debugging for distributed services

TraceRoot is an open-source debugging platform that helps engineers fix production issues 10x faster by combining structured traces, logs, and source code context with AI-powered analysis. Contributing | TraceRoot.AI | Community | SDK | Documentation Join us (Discord) in pushing the boundaries of debugging with AI agents. Please 🌟 Star TraceRoot on GitHub and be instantly notified of new releases. TraceRoot Framework Design Principles 🤖 Intelligence The framework enables multi-agent systems

Dwl: Dwm for Wayland

dwl - dwm for Wayland Join us on our IRC channel: #dwl on Libera Chat Or on the community-maintained Discord server. dwl is a compact, hackable compositor for Wayland based on wlroots. It is intended to fill the same space in the Wayland world that dwm does in X11, primarily in terms of functionality, and secondarily in terms of philosophy. Like dwm, dwl is: Easy to understand, hack on, and extend with patches One C source file (or a very small number) configurable via config.h Tied to as

Leprechauns, root causes, and other fairy tales

This is a short talk I gave a while ago about how complex systems fail, and root cause analysis. Transcript is below. Transcript We’re going to talk about root causes today, but since I only have about 10 minutes, I wanted to start with some stories from a book I’m writing called Bedtime Stories To Put Your Children To Sleep Instantly And Also Yourself. This first story is about leprechauns. Once upon a time, there was a company with a new employee, and one day the employee asked their manage

When root meets immutable: OpenBSD chflags vs. log tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware

A threat actor has been deploying a previously unseen malware called OVERSTEP that modifies the boot process of fully-patched but no longer supported SonicWall Secure Mobile Access appliances. The backdoor is a user-mode rootkit that allows hackers to hide malicious components, maintain persistent access on the device, and steal sensitive credentials. Researchers at Google Threat Intelligence Group (GTIG) observed the rootkit in attacks that may have relied on “an unknown, zero-day remote code

A quick look at unprivileged sandboxing

blog - git - desktop - images - contact A quick look at unprivileged sandboxing Disclaimer: This is to the best of my knowledge. It's a complicated topic, there are tons of options, and this only covers a tiny fraction of this topic anyway. If you spot mistakes, please tell me. Suppose you have a server daemon that you want to confine to a single directory. During the startup phase of the program, it also needs to read some files outside of that directory -- you can apply the confinement only

Plants monitor the integrity of their barrier by sensing gas diffusion

Plant materials and growth conditions Col-0 was used as the wild type unless stated otherwise. ein2-1, etr1-3, ate1-2;ate2-1, prt6-5, proWOX4-erYFP, proPXY:GUS, proPXY:erVenus and 35S:EIN3-GFP have been described previously10,13,27,37,38,39,40. ate1-2;ate2-1 mutants were reciprocally backcrossed into Col-0 for three generations and transfer DNA insertions were confirmed by genotyping to obtain double-homozygous mutants. Seeds were sown on half-strength MS (Duchefa) plates supplemented with 0.0

Cisco warns that Unified CM has hardcoded root SSH credentials

Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpatched devices with root privileges. Cisco Unified Communications Manager (CUCM), formerly known as Cisco CallManager, serves as the central control system for Cisco's IP telephony systems, handling call routing, device management, and telephony features. The vulnerability (tracked as CVE-2025-20309) was rated as maximum severity, and it is caused

“I Am Groot” Translates to “This Dancing Groot LEGO Set Hits All-Time Low” While Stock Lasts on Amazon

Who doesn’t love Lego? Appealing to folks of all ages, Lego makes for wonderful gifts or collectors items. I find myself just really enjoying the process of it all. Popping on a podcast or some music while I just tune out and build. You take each piece of the instructions one step at a time while you can see your progress moving along in real time. It’s pretty mindful and therapeutic as you put this cool thing together in front of you while your mind wanders and your real-life stressors momentar

New Linux udisks flaw lets attackers get root on major Linux distros

Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions. The first flaw (tracked as CVE-2025-6018) was found in the configuration of the Pluggable Authentication Modules (PAM) framework on openSUSE Leap 15 and SUSE Linux Enterprise 15, allowing local attackers to gain the privileges of the "allow_active" user. The other security bug (CVE-2025-6019) was discovered in libblockdev, and it enab

New Linux udisks flaw lets attackers get root on major Linux distros

Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions. The first flaw (tracked as CVE-2025-6018) was found in the configuration of the Pluggable Authentication Modules (PAM) framework on openSUSE Leap 15 and SUSE Linux Enterprise 15, allowing local attackers to gain the privileges of the "allow_active" user. The other security bug (CVE-2025-6019) was discovered in libblockdev, and it enab

Root raises $9M to launch its social platform with customizable apps

Root announced today that it has raised $9 million in seed funding to build a next-gen social platform, which offers customizable apps designed towards building and maintaining large communities. Headline Ventures and Konvoy Ventures led the round, with Day One Ventures, Untamed Ventures, Crunchyroll founder Kun Gao, Clark Valberg and Jack Dunlop among others participating. The company plans to launch the closed beta for the app soon. Root as a platform is notable for its customizability and ap

1972 Unix V2 "Beta" Resurrected

[TUHS] 1972 UNIX V2 "Beta" Resurrected Hi everyone, First-time poster here. Near the end of last year, I did some forensic analysis on the DMR tapes (https://www.tuhs.org/Archive/Applications/Dennis_Tapes) and had some fun playing around with them. Warren forwarded a few of my emails to this list at the end of last year and the beginning of this year, but it was never my intention for him to be my messenger, so I'm posting here myself now. Here's an update on my work with the s1/s2 tapes - I've

Topics: 00 jan root sdrwrw unix