Pouncing Dragon
pouncingdragon.bsky.social
Pouncing Dragon
@pouncingdragon.bsky.social
Finder of unintended features, collector of hobbies.
Reposted by Pouncing Dragon
There is zero chance I can terminate a LAN cable in under two minutes, let alone 52 seconds. @saintcon.bsky.social
October 24, 2025 at 6:38 PM
Reposted by Pouncing Dragon
Scathing, but all too obviously accurate, take on the AWS outage by @quinnypig.com.

You're engaging in professional malpractice if you don't share this with your stakeholders. Corey may be an engineer, but he communicates about the issues in an accessible manner.
www.theregister.com/2025/10/20/a...
Amazon brain drain finally caught up with AWS
column: When your best engineers log off for good, don’t be surprised when the cloud forgets how DNS works
www.theregister.com
October 22, 2025 at 5:47 AM
Reposted by Pouncing Dragon
Klaus and Glen are ridin' into Wild West Hackin' Fest - Deadwood 2025 with their talk "Dungeons & Dragons: The Security Tool You Didn’t Know You Needed Klaus and Glen" Don't ya go missin' it, virtual con and virtual training tickets are still available! wildwesthackinfest.com/register-for...
September 29, 2025 at 12:37 PM
Reposted by Pouncing Dragon
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074) blog.qwertysecurity.com/Articles/blo...
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074)
August 21, 2025 - Vulnerability Write-up
blog.qwertysecurity.com
August 30, 2025 at 4:17 PM
Reposted by Pouncing Dragon
SpaceFromSpace now features over 500 declassified Cold War era spy satellite images from all over the world! Each one fully browsable, interactive, and free for anyone to view.

spacefromspace.com/declassified...
August 13, 2025 at 11:42 AM
Reposted by Pouncing Dragon
Gerrymandering: the art of mathematically disproving majority rule.
July 30, 2025 at 12:54 PM
Reposted by Pouncing Dragon
so someone broke into my apartment at night and stole all of my swords and im kind of. in shock
July 31, 2025 at 1:25 PM
Reposted by Pouncing Dragon
why did it take me so long to find out about @bennjordan.bsky.social these videos are so good
youtu.be/xMYm2d9bmEA
The Art Of Poison-Pilling Music Files
YouTube video by Benn Jordan
youtu.be
July 30, 2025 at 5:32 PM
Reposted by Pouncing Dragon
Reposted by Pouncing Dragon
Meta’s track record on privacy was already spotty, but the newest web-to-app trick is particularly brazen. Here’s what to do next.
Protect Yourself From Meta’s Latest Attack on Privacy
Researchers recently caught Meta using an egregious new tracking technique to spy on you. Exploiting a technical loophole, the company was able to have their apps snoop on users’ web browsing. This tr...
www.eff.org
June 20, 2025 at 6:02 PM
Reposted by Pouncing Dragon
Our highly popular and technical training, "Malware and Memory Forensics with Volatility", has been fully converted to @volatilityfoundation.org 3 and significantly updated, including many new sections and 8 new, in-depth labs. Available online & in VA in October

memoryanalysis.net/courses-malw...
Malware and Memory Forensics Training - Memory Analysis
Malware and memory forensics training courses offered by the Memory Analysis Team.
memoryanalysis.net
June 11, 2025 at 4:36 PM
Reposted by Pouncing Dragon
“If the reports about Flock Nova are true, this is precisely the kind of dystopian panopticon we’ve warned about,” EFF’s @mguariglia.bsky.social told Government Technology News.
Flock’s Newest Police Tool Sparks Data Controversy
Flock Safety, a license plate reading tech firm that recently bought a drone company, is taking heat over the data sources for its new platform. It’s not the only law enforcement technology attracting...
www.govtech.com
May 28, 2025 at 5:06 PM
Reposted by Pouncing Dragon
Y'know, I've never taken any sponsorships, I'm very skeptical at the best of times and no sponsorship I've ever been approached about has ever passed my sniff test, so I thought I knew where this was going, but this is bigger scam than I'd expected.

www.youtube.com/watch?v=vc4y...
Exposing the Honey Influencer Scam
YouTube video by MegaLag
www.youtube.com
December 27, 2024 at 1:09 PM
Reposted by Pouncing Dragon
Nick Frichette’s research shows how gaining EC2 access can let you intercept and modify AWS SSM communications. By spoofing the SSM Agent, it’s possible to manipulate EC2 messages or sessions. Check out the tools and techniques explored in this fascinating deep dive:
Intercept SSM Communications - Hacking The Cloud
With access to an EC2 instance you can intercept, modify, and spoof SSM communications.
buff.ly
December 5, 2024 at 3:00 PM