@anon
sign up
@anon
sign up
pull down to refresh
Devs Discussion: Attack Vectors — S.Provoost, C.Raw, M.Schmidt & J.Song
www.youtube.com/watch?v=YPK6NLuhmnA
101 sats
\
0 comments
\
@RideandSmile
25 Jun 2024
bitdevs
related
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
www.helpnetsecurity.com/2025/07/28/vulnhuntr-open-source-tool-identify-remotely-exploitable-vulnerabilities/
110 sats
\
0 comments
\
@ch0k1
28 Jul
security
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401 | FortiGuard Labs
www.fortinet.com/blog/threat-research/threat-actors-exploit-geoserver-vulnerability-cve-2024-36401
10 sats
\
0 comments
\
@ch0k1
7 Sep 2024
security
Intel’s Memory Leak Nightmare: 5,000 Bytes per Second in the Hands of Hackers
scitechdaily.com/intels-memory-leak-nightmare-5000-bytes-per-second-in-the-hands-of-hackers/
40 sats
\
0 comments
\
@ch0k1
23 May
news
Understanding Security's New Blind Spot: Shadow Engineering
www.darkreading.com/vulnerabilities-threats/understanding-security-new-blind-spot-shadow-engineering
21 sats
\
0 comments
\
@ch0k1
9 Jun 2024
news
The 5 Most Common Cybersecurity Mistakes
127 sats
\
3 comments
\
@0xbitcoiner
21 May 2024
security
The Hacker's Perspective - 2600.spring.2022
medium.com/@rickswords/the-hackers-perspective-2600-spring-2022-aff526b6eace
21 sats
\
0 comments
\
@xianglo
29 Jun 2023
bitcoin
research!rsc: Timeline of the xz open source attack
research.swtch.com/xz-timeline
10 sats
\
0 comments
\
@Rsync25
2 Apr 2024
tech
Metasploit Module Released 4 Actively Exploited SharePoint 0-Day Vulnerabilities
cybersecuritynews.com/metasploit-module-for-sharepoint-0-day/
136 sats
\
0 comments
\
@ch0k1
28 Jul
security
CISA Presents Vision for the Common Vulnerabilities and Exposures (CVE) Program
www.cisa.gov/news-events/news/cisa-presents-vision-common-vulnerabilities-and-exposures-cve-program
21 sats
\
0 comments
\
@ch0k1
11 Sep
news
how to compromise security critical open source projects (NSA keynote, 2014)
archive.md/WwaAW
142 sats
\
1 comment
\
@standardcrypto
22 Sep
bitcoin
Retrofitting spatial safety to hundreds of millions of lines of C++
security.googleblog.com/2024/11/retrofitting-spatial-safety-to-hundreds.html
21 sats
\
0 comments
\
@ch0k1
16 Nov 2024
devs
US govt wants developers to stop coding 'unforgivable' bugs
www.theregister.com/2025/02/13/fbi_cisa_unforgivable_buffer_overflow/
76 sats
\
2 comments
\
@ch0k1
13 Feb
devs
CISA: Second SharePoint Flaw Disclosed at Pwn2Own Exploited in Attacks
www.securityweek.com/cisa-second-sharepoint-flaw-disclosed-at-pwn2own-exploited-in-attacks/amp/
21 sats
\
0 comments
\
@ch0k1
28 Mar 2024
security
New PerfektBlue Attack Exposes Millions of Cars to Remote Hacking
cybersecuritynews.com/bluetooth-protocol-stack-vulnerabilities/
91 sats
\
1 comment
\
@ch0k1
14 Jul
news
Addrman and eclipse attacks
github.com/bitcoin-core/bitcoin-devwiki/wiki/Addrman-and-eclipse-attacks
23 sats
\
0 comments
\
@AR0w
12 Dec 2023
bitcoin
Attackers are mapping your attack surface—are you?
www.bleepingcomputer.com/news/security/attackers-are-mapping-your-attack-surface-are-you/
115 sats
\
0 comments
\
@ch0k1
31 May
security
The Rise Of User-Hostile Software
den.dev/blog/user-hostile-software/
2777 sats
\
7 comments
\
@slatheredloss
24 Dec 2022
bitcoin
The Circle of Unfixable Security Issues
www.youtube.com/watch?v=lr1KuL8OmJY
41 sats
\
0 comments
\
@ek
21 Dec 2023
security
Apache Tomcat Vulnerability CVE-2025-24813 Exploited to Execute Code on Servers
cybersecuritynews.com/apache-tomcat-vulnerability-exploited/
20 sats
\
0 comments
\
@ch0k1
4 Apr
security
Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution
thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
13 sats
\
0 comments
\
@ch0k1
29 Jan
security
‼️ ATTENTION! Open Source Software is attacked!
805 sats
\
43 comments
\
@DarthCoin
31 May 2023
bitcoin
more