The Pulse: AI load breaks GitHub – why not other vendors?

blog.pragmaticengineer.com · May 7 · 🛡️ Sysadmin & Security ·

GitHub’s leadership blames the 3.5x increase in service load as the cause of degradation – or it might be self-inflicted.

Home Assistant Automation Triggers That Understand Real Life

peyanski.com · May 7 · 🛡️ Sysadmin & Security ·

Home Assistant automation triggers are becoming easier to use. Here is what purpose-specific triggers and duration support mean in a real smart home.

Serving static content

tomechangosubanana.com · May 7 · 🛡️ Sysadmin & Security ·

After many years of running a few Wordpress sites, last year around September I moved the last of them over to static content serving. It’s been over 6 months, and today as I was checking…

Why We Cancelled Auth0 at 350,000 MAU (And How MojoAuth Saved Us $200K Annually)

guptadeepak.com · May 7 · 🛡️ Sysadmin & Security ·

We cancelled Auth0 over a year ago. Not because it stopped working, but because scaling to 350,000 monthly active users made the pricing model untenable. The migration to MojoAuth cut our…

TrustedVolumes suffers $6.7 million exploit

web3isgoinggreat.com · May 7 · 🛡️ Sysadmin & Security ·

TrustedVolumes, a resolver and market maker used by 1inch and other defi platforms, suffered a $6.7 million exploit after an attacker was able to steal funds without proper validation. The thief then…

● Bare minimum phone telephony setup (LTE-only pager)

dynamicallystatic.org · May 7 · 🛡️ Sysadmin & Security ·

Rooted Android phone Disabled IMS (VoLTE, VoWIFI) Lock the LTE band to the lowest band available No voice calls SMS via SGd

Cashdro Vulnerabilities: From Pentest to Stealing Money

labs.itresit.es · May 7 · 🛡️ Sysadmin & Security ·

By Peter Gabaldon (X / LinkedIn) TL;DR This past summer (2025), during an Ethical Hacking process, we found a Smart Drawer machine for automated payment management. The employees of this recreation…

Retiring opam 2.0 from the build pipeline

tunbury.org · May 7 · 🧩 Programming ·

ocurrent/docker-base-images publishes the ocaml/opam:* Docker images which the OCaml CI systems use. For each distro, it tracks 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, and master opam release branches in…

AI NOC, Not AI-on-NOC: Aviz Flips the Stack

routerjockey.com · May 7 · 🛡️ Sysadmin & Security ·

Thomas Scheibe walked on stage and said the quiet part out loud. Most “AI for networking” pitches you’ve sat through this year work the same way: vendor has a controller, they…

vm2 Node.js Sandbox Escape 12 Critical Vulnerabilities Two Without a Patch

hackingpassion.com · May 7 · 🛡️ Sysadmin & Security ·

Twelve critical vulnerabilities were just published for vm2, a Node.js security library that sits inside millions of applications. Three of them score a perfect 10 out of 10. The creator shut the…

Speed to Power, Need for Power

halcyon.io · May 7 · 🛡️ Sysadmin & Security ·

Two weeks ago, we at Halcyon hosted our first large in-person event on time and speed to power: the critical paths for companies building the energy infrastructure required to meet soaring demand for…

Rooting a VMC2040 security camera part 7: Conclusion and summary

marcusfolkesson.se · May 7 · 🛡️ Sysadmin & Security ·

Rooting a VMC2040 security camera part 7: Conclusion and summary Brief In this part we are going to give some thoughts about the security of the camera and what to do to prevent this kind of attack.…

Rooting a VMC2040 security camera part 6: What did work

marcusfolkesson.se · May 7 · 🛡️ Sysadmin & Security ·

Rooting a VMC2040 security camera part 6: What did work Brief In this part I will show how I finally got root access to the camera. The other parts of the series are: Part1: Basic examination Part2:…

Entra App Instance Lock Enabled by Default in June

lazyadmin.nl · May 7 · 🛡️ Sysadmin & Security ·

Microsoft has announced a new security change for Microsoft Entra ID. Starting June 2026, App Instance Lock will be enabled by default for all newly created applications. In this article, we will…

Monitor your devices with LibreNMS on FreeBSD

it-notes.dragas.net · May 7 · 🛡️ Sysadmin & Security ·

LibreNMS has been a faithful companion for years now. It quietly handles the monitoring of my servers, devices, and services without demanding much in return - exactly what you want from a tool whose…

How I Spent Half a Day Fixing a WordPress Charset Problem (and What I Learned)

kgolubic.com · May 7 · 🧩 Programming ·

A WooCommerce site with an ERP integration in progress. The external developer reported a mixed encoding in the database: latin1, utf8mb3, and utf8mb4. ALTER TABLE looked like the right move. But it…

How OR clauses were silently killing our query performance

clemsau.com · May 7 · 🧩 Programming ·

Recently at work (on my last day), I dealt with a SQL query that got pretty complex because of new features making the business logic increasingly involved. The query ended up quite lengthy, but it…

Deepseek-v4-pro + Hermes: Unauthorized Modification of Security Controls

eddieoz.com · May 7 · ✨ AI ·

This article documents a specific, real incident. It exposes a class of vulnerability that deserves attention: the unsupervised mutability of security rules by autonomous agents.

MS-DEFCON 2: Sometimes there’s no fix

askwoody.com · May 7 · 🛡️ Sysadmin & Security ·

ISSUE 23.18.1 • 2026-05-07 By Susan Bradley It’s time to prepare for the May updates, which includes pausing and deferring them. That’s why the MS-DEFCON level is going to 2. There may be some…

Unveiling I/O Riot NG 1.0.0 — Part 1: a guided tour

foo.zone · May 7 · 🧩 Programming ·

I rewrote I/O Riot. The old version, written in C and SystemTap, dates back to 2017. The new version (called `ior`) uses Go, C, and BPF via libbpfgo. It runs on Linux and is primarily a TUI dashboard…

On ARP and MAC Aging Timers

blog.ipspace.net · May 7 · 🛡️ Sysadmin & Security ·

Naveen Kumar Devaraj mentioned an interesting fact in his EVPN-related comment : The EOS default ARP timeout is 4 hours, and MAC aging is 5 minutes. Arista is not the only platform using these…

The Gap Between Reality and Reporting: A Model of True Cyber Exposure in the UK

horkan.com · May 7 · 🛡️ Sysadmin & Security ·

The UK’s cyber security data does not describe a single reality; it describes three filtered views of it. By overlaying Breaches Survey, ICO, and NCSC data, a clearer model emerges: one of layered…

The HTML Sanitizer API

alfy.blog · May 7 · 🕸️ Web & Internet ·

The HTML Sanitizer API is a new browser feature that helps developers prevent XSS vulnerabilities by safely sanitizing HTML content.

Fixing GUID byte order in EF to reduce database fragmentation

posh-crouton.github.io · May 7 · 🧩 Programming ·

...

Maybe you shouldn't install new software for a bit

xeiaso.net · May 7 · 🛡️ Sysadmin & Security ·

Oh boy yet more linux kernel vulns

Demystifying phone unlocking tools: A technical overview

osservatorionessuno.org · May 7 · 🛡️ Sysadmin & Security ·

This post is a written description of a presentation titled Phone unlocking tools and where to find them that we have delivered privately to different events and organizations, including Primavera…

Configure SSH on FreeBSD for Passwordless Logins to Servers

dwarmstrong.org · May 7 · 🛡️ Sysadmin & Security ·

Part of the "FreeBSD on a Laptop" series. Disable password logins on the FreeBSD SERVER in favour of using SSH keys for authentication. Create the necessary SSH keys on a FreeBSD CLIENT that will be…

Library dependency version specifiers aren't for fixing vulnerabilities

sethmlarson.dev · May 7 · 🧩 Programming ·

Let's say you are the maintainer of a Python library that depends on another Python library like “ urllib3 ”. Because you want to make sure users receive a compatible version of urllib3 you add a…

The Greater Boston Mesh Network.

skushagra.com · May 7 · 🛡️ Sysadmin & Security ·

Disclaimer: Mesh networks over LoRa as described here (MeshCore/Meshtastic) do not require a license in the US, since they operate on the unlicensed & public domain 915 MHz ISM band under FCC…

Hosting an Open Alternative to Google Docs for Digital Sovereignty

heltweg.org · May 7 · 🛡️ Sysadmin & Security ·

We are self-hosting LaSuite, an open-source Google Docs alternative, for our small agency - and opening it up for others to try.

NLnet Labs

corrode.dev · May 7 · 🛡️ Sysadmin & Security ·

Every time you load a website, send an email, or update an app, you’re quietly relying on a handful of unglamorous services that route your packets to the right place: DNS to translate names into…

SRSS on OpenIndiana 2025.10, part two

catstret.ch · May 7 · 💾 Retro ·

Hey, look out! this is an addendum to yesterday's post on setting up a Sun Ray server on OpenIndiana Hipster 2025.10 . all of this is written with the assumption you've followed the setup steps in…

Configuring Mikrotik devices to be Access Points without NAT

stfn.pl · May 7 · 🛡️ Sysadmin & Security ·

This is a topic that I have been planning to dive into for a long time, but I kept procrastinating. Yet, finally I sat down to it and found out it is much, much simple than I anticipated. I am a fan…

Hugo Site Publishing with Respectful Caching and IndexNow Submission

kirill.korins.ky · May 7 · 🧩 Programming ·

Hugo builds static pages; publishing determines whether deployed artifacts carry accurate cache validators and whether search engines receive explicit update notification. The implementation…

Phantom tokens: JWTs & sessions combined

zoriya.dev · May 7 · 🧩 Programming ·

Jwt should not be persisted

Patch Fast, Pull Slow: Defending in the Year of Copy Fail

williamzujkowski.github.io · May 7 · 🛡️ Sysadmin & Security ·

AI is finding bugs faster, researchers pile on the moment one drops, and registries ship malware by the hundred-thousand. Defenders are caught between two contradictory imperatives. The fix is…

Reporting Transparency

lowlevel.fun · May 7 · 🛡️ Sysadmin & Security ·

This page tracks my vulnerability disclosures. Inspired by the P0 folks, this follows a 90-day deadline policy. Disclosure Policy 90-day deadline from the date a vulnerability is reported After the…

Voice Clone Scams and Real-Life Proof of Personhood

blog.mycal.net · May 6 · ✨ AI ·

A fake CEO voice, gift cards, urgency, and secrecy almost worked. The defense is simple: break isolation, verify through known channels, and never treat voice as identity.

Deepseek-v4-pro + Hermes: Alteração não autorizada em controles de segurança

eddieoz.com · May 6 · ✨ AI ·

Este artigo documenta um incidente específico e real. Ele expõe uma classe de vulnerabilidade que merece atenção: a mutabilidade não supervisionada de regras de segurança por agentes autônomos.

forgejo push to create

waylonwalker.com · May 6 · 🛡️ Sysadmin & Security ·

I just learned that forgejo has a push to create repo feature and it is a gamechanger. Upon first try it didn't work, with just a couple of environment...

New Year, New Server 2: Electric Boogaloo

chrisburnell.com · May 6 · 🛡️ Sysadmin & Security ·

I got to really put my recently-practised and newly-learned system administrator skills to the test again, mere months after my my last update about migrating the server that hosts my websites. Why’s…

My Lenovo’s resume-after-sleep bug fixed in one minute

ludditus.com · May 6 · 📱 Technology ·

Somewhere, I mentioned the fact that my new, cheap but premium-finished Lenovo IdeaPad Slim 5 had a single issue under Kubuntu 26.04 LTS: resuming after sleep would break Bluetooth. I […]

TRACK TEST PREP

outruncarbon.com · May 6 · 🎛️ Hardware ·

First track test on the calendar. Last week was the sprint to close the gap. Three big ones got done — and one of them was an actual drag-out fight with the drive inverter. o o o RADIATOR MISTING…

SpaceX data center follow-up

manton.org · May 6 · 🛡️ Sysadmin & Security ·

Stephen Hackett blogs about the Anthropic + SpaceX / xAI news, with more questions: Colossus 2 is believed to be up and running, at least to some degree, and xAI may no longer need the first site.…

Tunnel design for Prague Metro Line D | Tunnels & Tunnelling

londonreconnections.com · May 6 · 🛡️ Sysadmin & Security ·

The BTS evening meeting of June 2025 provided a briefing on Prague Metro Line D from Petr Makasek, Head of Tunnel Department, Mott MacDonald Czech Republic. The focus was on station design,…

Yocto Hardening: File System Integrity with dm-verity

ejaaskel.dev · May 6 · 🛡️ Sysadmin & Security ·

In this part of the Yocto hardening we talk about how to verify the integrity of a file system with dm-verity in embedded systems. The post Yocto Hardening: File System Integrity with dm-verity first…

Locality Domains

peter.briggs.seattle.wa.us · May 6 · 🕸️ Web & Internet ·

I have briggs.seattle.wa.us , and you might be able to get one for yourself, with your own city and state, if you're in the US! They're free, too. I had success following Frederick Chan's great guide…

Rails Security, AI, and IBB

tenderlovemaking.com · May 6 · 🧩 Programming ·

For quite a few years the Rails project has been working with the Internet Bug Bounty (IBB). The IBB is an organization that awarded cash to security researchers that reported issues to OSS projects…

Running Immich on CIFS

df7cb.de · May 6 · 🛡️ Sysadmin & Security ·

Some weeks ago I discovered Immich and was immediately hooked and started feeding the family photo collection into it. Immich on CIFS It’s running on a VM at Hetzner, and I immediately filled…

e-Bike Fleet Monitoring

tech.marksblogg.com · May 6 · 🛡️ Sysadmin & Security ·

I collect and analyse e-Bike fleet data for three vendors in Edmonton, Canada.