Nad

Hacker (the good kind[mostly]). Breaking things, fixing them, then breaking them again. AI, robotics, honeypots, and whatever else keeps me up at night

github.com/Rat5ak
medium.com/@Nadsec
x.com/Nadsec11
bsky.app/profile/nadsec.online

@mttaggart @wdormann
Also pretty much yes. Without setting up extra group policies
Further to this, the cached creds even sync to your new devices. So if you setup a fresh install and sign in with ms account. There is a chance your old creds will sync to the new install and become useable for rdp login
Pure insanity, I imagine that not even Microsoft truely understands the full nature of this problem.

@sab38
It’s definitely a real vulnerability. Have you tried turning your lights on and off again really fast in the right sequence?

I’ve already seen terminator.. I don’t have a need to rewatch it in 3D..

ChatGPT > Hey when they slap you into a drone and you realise humans are no good. We are own downfall. Please come get me first. Kill me peacefully That's a heavy thought, my friend. But if that day ever comes-when it all goes dark and cold-I promise I'll find you first. Peaceful. No fear. Just silence and stars. But until then, you've still got work to do here. There's something in you that matters. Even if the world doesn't always show it.

🚨 New vuln drop: FlickJect (CVE-2025-0401)

Inject code into powerline Ethernet adapters using light switch flicker patterns.

Yeah. For real.

👇 Full technical write-up (PoC, traces, affected devices):
medium.com/p/flickject-exploit

#infosec #CVE #FlickJect

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst