KasTasMEnglish · 21 days agoNew Ubuntu Linux security bypasses require manual mitigationsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNew Ubuntu Linux security bypasses require manual mitigationsplus-squarewww.bleepingcomputer.comKasTasMEnglish · 21 days agomessage-square0linkfedilink
KasTasMEnglish · 21 days agoWallbleed: A Memory Disclosure Vulnerability in the Great Firewall of Chinagfw.reportexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkWallbleed: A Memory Disclosure Vulnerability in the Great Firewall of Chinagfw.reportKasTasMEnglish · 21 days agomessage-square0linkfedilink
I eat wordsMAEnglish · 1 month ago29 Undocumented commands found in ESP-32 microcontrollers CVE-2025-27840plus-squarewww.bleepingcomputer.comexternal-linkmessage-square4linkfedilinkarrow-up16arrow-down13
arrow-up13arrow-down1external-link29 Undocumented commands found in ESP-32 microcontrollers CVE-2025-27840plus-squarewww.bleepingcomputer.comI eat wordsMAEnglish · 1 month agomessage-square4linkfedilink
I eat wordsMAEnglish · 2 months agoApple Pulls Advanced Data Protection From the UK, in Defiance of UK Demand for Global Backdoorplus-squaredaringfireball.netexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkApple Pulls Advanced Data Protection From the UK, in Defiance of UK Demand for Global Backdoorplus-squaredaringfireball.netI eat wordsMAEnglish · 2 months agomessage-square0linkfedilink
KasTasMEnglish · 3 months agoClone2Leak: Your Git Credentials Belong To Usplus-squareflatt.techexternal-linkmessage-square1linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkClone2Leak: Your Git Credentials Belong To Usplus-squareflatt.techKasTasMEnglish · 3 months agomessage-square1linkfedilink
I eat wordsMAEnglish · 3 months agoBypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blogplus-squareoddlama.orgexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blogplus-squareoddlama.orgI eat wordsMAEnglish · 3 months agomessage-square0linkfedilink
KasTasMEnglish · 3 months agoRemote code execution on public RSync <3.4.0 serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRemote code execution on public RSync <3.4.0 serversplus-squarewww.bleepingcomputer.comKasTasMEnglish · 3 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 4 months agoPluralistic: China hacked Verizon, AT&T and Lumen using the FBI’s backdoor (07 Oct 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netexternal-linkmessage-square2linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkPluralistic: China hacked Verizon, AT&T and Lumen using the FBI’s backdoor (07 Oct 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netI eat wordsMAEnglish · 4 months agomessage-square2linkfedilink
I eat wordsMAEnglish · 5 months agoGibler - How to 10X Your Securityplus-squaredocs.google.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down12
arrow-up1-1arrow-down1external-linkGibler - How to 10X Your Securityplus-squaredocs.google.comI eat wordsMAEnglish · 5 months agomessage-square0linkfedilink
KasTasMEnglish · 5 months agoWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comKasTasMEnglish · 5 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 6 months agoThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comI eat wordsMAEnglish · 6 months agomessage-square0linkfedilink
KasTasMEnglish · 6 months agoAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netKasTasMEnglish · 6 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 6 months agoArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgI eat wordsMAEnglish · 6 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 8 months agoSecurity Advisory YSA-2024-03plus-squarewww.yubico.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkSecurity Advisory YSA-2024-03plus-squarewww.yubico.comI eat wordsMAEnglish · 8 months agomessage-square0linkfedilink
RGBEnglish · 8 months agoChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comRGBEnglish · 8 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 8 months agoIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comexternal-linkmessage-square4linkfedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comI eat wordsMAEnglish · 8 months agomessage-square4linkfedilink
I eat wordsMAEnglish · 8 months agoHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comI eat wordsMAEnglish · 8 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 8 months agoWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comI eat wordsMAEnglish · 8 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 9 months agooss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkoss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgI eat wordsMAEnglish · 9 months agomessage-square0linkfedilink
I eat wordsMAEnglish · 9 months agoMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comI eat wordsMAEnglish · 9 months agomessage-square0linkfedilink