3 Comments
User's avatar
Neural Foundry's avatar

Great edition covering some critical developments. The FlipSwitch technique is fascinating - it's a reminder that kernel protections can inadvertently open new attack vectors when trying to close old ones. The fact that a single protection (making sys_call_table const) killed Diamorphine but enabled opcode-based hooking shows how defense in depth remains essential. The CrowdStrike research on CVE-2025-61882 is particularly concerning given how quickly the exploit disseminated through ShinyHunters' Telegram channel. The timeline from Oracle's public post (Oct 3) to widespread exploitation is remarkably compressed. One thing that stikes me about the LLM detection rule generation posts is the emphasis on evaluation frameworks - Sublime's ADÉ evaluation using precision, robustness, and cost metrics feels like it's setting a standard for the industry. The pyramid of pain penalty for IP-based matching is clever. I'd be interested to see how these frameworks perform against adversarial inputs designed to produce plausible but ineffective rules.

Expand full comment
Siddhant Mishra's avatar

Amazing!

Expand full comment
Richmond Owusu's avatar

Thank you.

Expand full comment