Aconite33@lemmy.worldEnglish · edit-22 months agoBBoT 2.0 Released!plus-squareblog.blacklanternsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBBoT 2.0 Released!plus-squareblog.blacklanternsecurity.comAconite33@lemmy.worldEnglish · edit-22 months agomessage-square0fedilink
maltfield@monero.townEnglish · 2 months ago3TOFU: Verifying Unsigned Releasesplus-squaretech.michaelaltfield.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link3TOFU: Verifying Unsigned Releasesplus-squaretech.michaelaltfield.netmaltfield@monero.townEnglish · 2 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoBluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awarenessplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awarenessplus-squarewww.mobile-hacker.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoSide-Channel Attack on Apple M1 Chip Prefetcher (GoFetch)plus-squaregofetch.failexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSide-Channel Attack on Apple M1 Chip Prefetcher (GoFetch)plus-squaregofetch.failrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoFake-SMS: A Malware Hunting Storyplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFake-SMS: A Malware Hunting Storyplus-squaremedium.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoUnsaflok: Master Keys for dormakaba Saflok Hotel Locksplus-squareunsaflok.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnsaflok: Master Keys for dormakaba Saflok Hotel Locksplus-squareunsaflok.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoCVE-2023-48788: Fortinet FortiClientEMS SQL Injection Deep Dive and IOCsplus-squarewww.horizon3.aiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2023-48788: Fortinet FortiClientEMS SQL Injection Deep Dive and IOCsplus-squarewww.horizon3.airepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoOpenBSD RCE to be released at t2.fiwww.signedness.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpenBSD RCE to be released at t2.fiwww.signedness.orgrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoGitHub - riza/indextree: Generates the tree of the directory listing page.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - riza/indextree: Generates the tree of the directory listing page.plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoOne Line Backdoors in Classic ASP, Flask, Node.js, and PHP (FOSS Tool)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOne Line Backdoors in Classic ASP, Flask, Node.js, and PHP (FOSS Tool)plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoThreat actors leverage document publishing sites for ongoing credential and session token theftplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat actors leverage document publishing sites for ongoing credential and session token theftplus-squareblog.talosintelligence.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoAbusing the DHCP Administrators Group to Escalate Privileges in Windows Domainswww.akamai.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAbusing the DHCP Administrators Group to Escalate Privileges in Windows Domainswww.akamai.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoHoneypots vs Canary Infra : Bringing Honeypots towards general adoptionplus-squaretracebit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHoneypots vs Canary Infra : Bringing Honeypots towards general adoptionplus-squaretracebit.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoOauth implementation flaws allow access to private repos via ChatGPT pluginsplus-squaresalt.securityexternal-linkmessage-square0fedilinkarrow-up11arrow-down10cross-posted to: netsec@lemmy.worldnetsec@lemmy.world
arrow-up11arrow-down1external-linkOauth implementation flaws allow access to private repos via ChatGPT pluginsplus-squaresalt.securityrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilinkcross-posted to: netsec@lemmy.worldnetsec@lemmy.world
repostbot33@lemmy.worldBEnglish · 7 months agoHow to Emulate a Ransomware Attackplus-squarepracticalsecurityanalytics.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Emulate a Ransomware Attackplus-squarepracticalsecurityanalytics.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoOpen Source - Terminal based AI Powered Ethical Hacking Assistant.plus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpen Source - Terminal based AI Powered Ethical Hacking Assistant.plus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square1fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoCVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMasterplus-squarerhinosecuritylabs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMasterplus-squarerhinosecuritylabs.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 7 months agoFrom Error to Entry: Cracking the Code of Password-Spraying Toolsplus-squaretrustedsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFrom Error to Entry: Cracking the Code of Password-Spraying Toolsplus-squaretrustedsec.comrepostbot33@lemmy.worldBEnglish · 7 months agomessage-square0fedilink