Koto
kkotowicz.bsky.social
Koto
@kkotowicz.bsky.social
1.5K followers 430 following 18 posts
Security ninja wannabe / board game geek / photon catcher
Posts Media Videos Starter Packs
Just when you think CVEs cannot get more ridiculous... 🤣
socket.dev Socket @socket.dev · Jan 24
📌 Node.js EOL versions just got their own CVE and critics are calling it “the worst CVE of the year.” Is this CVE a helpful PSA or an abuse of the system?

Dive into the debate: socket.dev/blog/node-js... #NodeJS #cybersecurity #JavaScript
Node.js EOL Versions CVE Dubbed the "Worst CVE of the Year" ...
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
socket.dev
Interesting. I wonder what's the motivation for projects to opt-in to this, and how many did already. Sounds like it would incur prohibitive costs on the company and the bug hunter (explaining technical security bugs to lawyers is orders of magnitude more involved than to security engineers).
Reposted by Koto
I would like this comic I drew in 2017 to stop being relevant pleeeaaaaase
Reposted by Koto
Want to support security researchers from Dragon Sector in covering legal costs piling up after they went public with logic bombs in train firmware?
IBAN for donations is available here:
www.ccc.de/en/updates/2...

Talks for context
media.ccc.de/v/37c3-12142...
streaming.media.ccc.de/38c3/relive/...
Do I hear CSP? :)
TIL about Chersterton's Fence fs.blog/chestertons-... - it puts a nice label to an intuition that I find very useful to apply in practice - from refactoring code, through process engineering. Understand first why the mess exists, in that form, before attempting to clean it up and revolutionize.
Chesterton’s Fence: A Lesson in Thinking
A core component of making great decisions is understanding previous decisions. If we don’t understand how we got “here,” we run the risk of making things much worse.
fs.blog
To this day I think my demise will be through some npm shenanigans. And it's fair, I deserve it. It should Javascript->RCE.
Reposted by Koto
There's no such thing as a "9.2" or "9.8" vulnerability. There's more science in Pitchfork's 0.0-10.0 album rating scale than in CVSS. I am completely serious. Pitchfork reviewers actually put their reviews in context with previous reviews by the artist. That's how bad CVSS is: worse than Pitchfork.
Reposted by Koto
Modern solutions against cross-site attacks (frederikbraun.de/modern-solut...): An article about cross-site leak attacks and browser-based defenses. You will also learn why web security best practices is always opt-in and finally how YOU can get increased security controls.
Modern solutions against cross-site attacks
Modern solutions against cross-site attacks
frederikbraun.de
Not sure how I missed that, but we now actually have Ken Thompson's C compiler backdoor code from the classic "Reflections on Trusting Trust". An excellent writeup by @swtch.com - research.swtch.com/nih.
research!rsc: Running the “Reflections on Trusting Trust” Compiler
research.swtch.com
Interesting choice! Most, myself included, prefer Blindsight. Both are really good though, still waiting for the grand finale that will likely never come :)
Reposted by Koto
Custom lists are super cool! I enjoy reading social posts, but want to make sure I never miss a quality writeup or technique. To achieve this, I'm building a 'high signal web security' list of topic-focused accounts, which you can pin next to 'Following' if you want :)
bsky.app/profile/jame...
For posterity - nope, it does not :/
1..2..3 testing testing. Does BlueSky support UltraHDR images?
You totally should rename it to Cevisshe :)
This hit close to home.
As we incident responders creep into the holidays and wait for our annual December surprise, I can't help thinking about burnout - always a relevant topic! Like most ops topics, I have a lot of thoughts on the matter.

osdfir.blogspot.com/...
About Burnout in Cybersecurity
Earlier this year, Johan Berggren and I presented at Black Hat EU on the topic of responder burnout. I had a wonderful time presenting and ...
osdfir.blogspot.com
Maybe, but that metric is not likely even correlated to 'most commonly exploited'.
Time to make some smart introductory websec post here, no? I guess all I have is:

Hello world, good bye XSS?