RC RANDOM CHAOS

Articles

Long-form writing on tech, culture, and the edges of the internet.

gtfobinsprivilege escalation

GTFOBins catalogues privilege misconfiguration

GTFOBins documents a structural property of Unix privilege: grants bind to binaries, not operations, and the gap is the escalation surface.

8 min read
linux kernel securityvulnerability management

The kernel commit lands. Your fleet is exposed.

Linux kernel CVEs publish without distro pre-notice. The exposure window opens at upstream commit, not at advisory. Measure the right number.

6 min read
cybersecuritynetworking

The router is signing its own logs

Iran's claim about US backdoors in networking equipment describes an exposure pattern already present. The device is an actor, not infrastructure.

6 min read
windows defenderredsun

RedSun turned Defender into a write primitive

RedSun turned Windows Defender's remediation path into a SYSTEM-level write primitive. The mechanism, the class, and what it exposes.

6 min read
ransomwarewiper

Paying the ransom buys nothing here.

A ransomware build that destroys files is a wiper. The defensive failure is execution authority over data, not cryptography.

8 min read
windows securityprivilege escalation

Unknown party drops funnyapp.exe Windows zeroday

A zeroday privilege escalation binary named funnyapp.exe exposes the Windows default trust model. What failed, what it exposes, what must change.

7 min read
chrome zero-dayv8 exploitation

Chrome's fourth 2026 zero-day ships mid-cycle

Google's fourth exploited Chrome zero-day of 2026 patches a V8 type confusion bug. The real risk is the patch-to-deployment window.

6 min read
ciscocve

The login page was never the boundary

Cisco's CVSS 9.8 IMC authentication bypass shows why perimeter-based identity fails: when reachability equals admin, the network is the credential.

6 min read

Google's 1,302 case studies prove almost nothing

4 min read

Meta cut 8,000 jobs to fund GPUs

3 min read
ransomwareincident response

Ransomware ships a wiper

A ransomware strain destroys files above 128KB, breaking its own decryption model. What the failure exposes about reversibility assumptions.

7 min read
cpanelcontrol-plane-security

Your hosting panel is your attack surface

Active cPanel exploitation is a control plane compromise. The boundary failed before the login form. Operator briefing on what that means.

7 min read