repostbot33@lemmy.worldBEnglish · 8 months agoMind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu - Exodus Intelligenceplus-squareblog.exodusintel.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu - Exodus Intelligenceplus-squareblog.exodusintel.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoPyPI Suspends New User Registration In Wake of Large Typosquatting Campaignplus-squareblog.phylum.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPyPI Suspends New User Registration In Wake of Large Typosquatting Campaignplus-squareblog.phylum.iorepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoAfter almost 7 years, new version of drozer was releasedplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAfter almost 7 years, new version of drozer was releasedplus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoIntroducing SharpConfluxplus-squarelabs.nettitude.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIntroducing SharpConfluxplus-squarelabs.nettitude.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoCrumbled Security: Unmasking the Cookie-Stealing Malware Threatplus-squarewww.cyberark.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrumbled Security: Unmasking the Cookie-Stealing Malware Threatplus-squarewww.cyberark.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoMalicious Implant to remotely control Electronic Locks via WiFiplus-squareblog.pridesec.com.brexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious Implant to remotely control Electronic Locks via WiFiplus-squareblog.pridesec.com.brrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoANSI Escape sequence injection in wall (util-linux)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkANSI Escape sequence injection in wall (util-linux)plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months ago“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installationplus-squarelabs.guard.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installationplus-squarelabs.guard.iorepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months ago11 year old security bug in util-linux (Leak user passwords on Ubuntu)people.rit.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link11 year old security bug in util-linux (Leak user passwords on Ubuntu)people.rit.edurepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months ago31 Round SHA256 Collision Proof of Conceptplus-squaregist.github.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link31 Round SHA256 Collision Proof of Conceptplus-squaregist.github.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoReversing a vulnerability in the Ichitaro Office Suite and Leveraging it into an FP overwrite for Silent Code Execution (RE walkthrough)plus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReversing a vulnerability in the Ichitaro Office Suite and Leveraging it into an FP overwrite for Silent Code Execution (RE walkthrough)plus-squareblog.talosintelligence.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoFlipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniquesplus-squarepwning.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFlipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniquesplus-squarepwning.techrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoAbusing MiniFilter Altitude to blind EDRplus-squaretierzerosecurity.co.nzexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAbusing MiniFilter Altitude to blind EDRplus-squaretierzerosecurity.co.nzrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoPreventing Cross-Service UDP Loops in QUICplus-squarebughunters.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPreventing Cross-Service UDP Loops in QUICplus-squarebughunters.google.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoReleasing Substation v1.0plus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReleasing Substation v1.0plus-squaremedium.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoLinux kernel privesc proof of concept CVE-2024-1086, working on ubuntu and debianplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLinux kernel privesc proof of concept CVE-2024-1086, working on ubuntu and debianplus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoInside the shadowy global battle to tame the world’s most dangerous technologyplus-squarewww.politico.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInside the shadowy global battle to tame the world’s most dangerous technologyplus-squarewww.politico.eurepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoFrida on Java applications and applets in 2024plus-squaresecurity.humanativaspa.itexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFrida on Java applications and applets in 2024plus-squaresecurity.humanativaspa.itrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoBlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code executionplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code executionplus-squarewww.mobile-hacker.comrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 8 months agoShadowRay: First Known Attack Campaign Targeting AI Workloads Exploited In The Wildplus-squarewww.oligo.securityexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkShadowRay: First Known Attack Campaign Targeting AI Workloads Exploited In The Wildplus-squarewww.oligo.securityrepostbot33@lemmy.worldBEnglish · 8 months agomessage-square0fedilink