dmv.community is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small regional Mastodon instance for those in the DC, Maryland, and Virginia areas. Local news, commentary, and conversation.

Administered by:

Server stats:

170
active users

#exploit

5 posts4 participants0 posts today
heise Security<p>Jetzt patchen! Angreifer attackieren Nakivo Backup &amp; Replication Director</p><p>Angreifer nutzen eine Sicherheitslücke in der Backuplösung Nakivo Backup &amp; Replication Director aus. Es gibt einen Sicherheitspatch.</p><p><a href="https://www.heise.de/news/Jetzt-patchen-Angreifer-attackieren-Nakivo-Backup-Replication-Director-10324114.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-An</span><span class="invisible">greifer-attackieren-Nakivo-Backup-Replication-Director-10324114.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Angreifer machen sich an Hintertür in Cisco Smart Licensing Utility zu schaffen</p><p>Jetzt patchen! Angreifer verschaffen sich Adminzugriff auf Cisco Smart Licensing Utility.</p><p><a href="https://www.heise.de/news/Angreifer-machen-sich-an-Hintertuer-in-Cisco-Smart-Licensing-Utility-zu-schaffen-10323893.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Angreifer-machen</span><span class="invisible">-sich-an-Hintertuer-in-Cisco-Smart-Licensing-Utility-zu-schaffen-10323893.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
jbz<p>💣 Microsoft isn't fixing 8-year-old zero day used for spying <br>—The Register</p><p>"We told Microsoft but they consider it a UI issue, not a security issue. So it doesn't meet their bar for servicing as a security update, but it might be fixed in a later OS version, or something along those lines." </p><p><a href="https://www.theregister.com/2025/03/18/microsoft_trend_flaw/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/18/mic</span><span class="invisible">rosoft_trend_flaw/</span></a></p><p><a href="https://indieweb.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://indieweb.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://indieweb.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
eicker.news tech news<p>»<a href="https://eicker.news/tags/BenStiller" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BenStiller</span></a>, <a href="https://eicker.news/tags/MarkRuffalo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MarkRuffalo</span></a> and More Than 400 <a href="https://eicker.news/tags/Hollywood" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hollywood</span></a> Names Urge <a href="https://eicker.news/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> to Not Let <a href="https://eicker.news/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> Companies ‘<a href="https://eicker.news/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a>’ <a href="https://eicker.news/tags/CopyrightedWorks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CopyrightedWorks</span></a>.« <a href="https://variety.com/2025/digital/news/hollywood-urges-trump-block-ai-exploit-copyrights-1236339750/?eicker.news" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">variety.com/2025/digital/news/</span><span class="invisible">hollywood-urges-trump-block-ai-exploit-copyrights-1236339750/?eicker.news</span></a> <a href="https://eicker.news/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://eicker.news/tags/media" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>media</span></a></p>
Bmixed<p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cybernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybernews</span></a> <a href="https://mastodon.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://mastodon.social/tags/vuln" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vuln</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technews</span></a><br>Supply chain attack on popular GitHub Action exposes CI/CD secrets<br><a href="https://www.bleepingcomputer.com/news/security/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/</span></a></p>
ask DNA<p>I love that every time there is an article of an exploit/hack, there is an ominous stock photo (or AI thing) of a person in a hoodie and sunglasses in the dark. I mean, yes, that looks exactly like every hacker I know but it's also just kinda silly.</p><p><a href="https://urusai.social/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> <a href="https://urusai.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://urusai.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Allstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Allstate</span></a> sued for exposing personal info in <a href="https://mas.to/tags/plaintext" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plaintext</span></a> • The Register</p><p>Crooks built <a href="https://mas.to/tags/bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bots</span></a> to <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> astoundingly bad quotation website and made off with data on thousands<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://www.theregister.com/2025/03/10/allstate_sued_pii_exposure/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/10/all</span><span class="invisible">state_sued_pii_exposure/</span></a></p>
Blue DeviL // SCT<p>A very detailed writeup on CVE-2025–21333 Windows heap-based buffer overflow analysis</p><p>cc: <span class="h-card" translate="no"><a href="https://infosec.exchange/@ale98" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ale98</span></a></span> </p><p><a href="https://medium.com/@ale18109800/cve-2025-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@ale18109800/cve-20</span><span class="invisible">25-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae</span></a></p><p><a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilityresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilityresearch</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/writeup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>writeup</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a></p>
heise Security<p>Attacken auf VMware ESXi: Immer noch zehntausende Server verwundbar</p><p>Sicherheitsforscher warnen, dass trotz laufender Angriffe weltweit noch mehr als 40.000 Instanzen nicht gepatcht sind. Davon ist auch Deutschland betroffen. </p><p><a href="https://www.heise.de/news/Attacken-auf-VMware-ESXi-Immer-noch-zehntausende-Server-verwundbar-10307632.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Attacken-auf-VMw</span><span class="invisible">are-ESXi-Immer-noch-zehntausende-Server-verwundbar-10307632.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Nonilex<p>“He can come back when he is ready for Peace,” <a href="https://masto.ai/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> posted on social media about <a href="https://masto.ai/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> President <a href="https://masto.ai/tags/Zelensky" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zelensky</span></a>.</p><p>The *agreement* [robbery] he had prepared for Zelensky, giving the <a href="https://masto.ai/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> rights to <a href="https://masto.ai/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> Ukraine’s critical <a href="https://masto.ai/tags/minerals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>minerals</span></a> in exchange for a vaguely outlined security guarantee by someone not necessarily the US, remains unsigned.<br>
<a href="https://masto.ai/tags/geopolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geopolitics</span></a> <a href="https://masto.ai/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://masto.ai/tags/Putin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Putin</span></a> <a href="https://masto.ai/tags/PutinsPuppet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PutinsPuppet</span></a> <a href="https://masto.ai/tags/MafiaState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MafiaState</span></a> <a href="https://masto.ai/tags/ForeignPolicy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ForeignPolicy</span></a> <a href="https://masto.ai/tags/diplomacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>diplomacy</span></a> <a href="https://masto.ai/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://masto.ai/tags/war" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>war</span></a> <a href="https://masto.ai/tags/allies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>allies</span></a> <a href="https://masto.ai/tags/authoritarianism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authoritarianism</span></a> <a href="https://masto.ai/tags/RevengePolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RevengePolitics</span></a> <a href="https://masto.ai/tags/chaos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chaos</span></a></p>
Marcus "MajorLinux" Summers<p>Apple is aware of the vulnerability and it'll take a lot to execute, but this is still dangerous.</p><p>Find My Network Exploit Turns Any Bluetooth Device Into a Tracker </p><p><a href="https://www.macrumors.com/2025/02/27/security-flaw-apple-find-my-track-any-device/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">macrumors.com/2025/02/27/secur</span><span class="invisible">ity-flaw-apple-find-my-track-any-device/</span></a></p><p><a href="https://toot.majorshouse.com/tags/FindMyNetwork" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FindMyNetwork</span></a> <a href="https://toot.majorshouse.com/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://toot.majorshouse.com/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://toot.majorshouse.com/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> <a href="https://toot.majorshouse.com/tags/Hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hardware</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
h o ʍ l e t t<p>→ How to Backdoor Large Language Models<br><a href="https://blog.sshh.io/p/how-to-backdoor-large-language-models" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sshh.io/p/how-to-backdoor</span><span class="invisible">-large-language-models</span></a></p><p>“LLMs can already often be found making important decisions […] and writing millions of lines of code. By either poisoning the pre-training data or finetuning, the model’s behavior can be altered to act differently when it sees certain keywords. This allows a <a href="https://mamot.fr/tags/bad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bad</span></a> actor to bypass these <a href="https://mamot.fr/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> moderation systems or use <a href="https://mamot.fr/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> written <a href="https://mamot.fr/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a> (generated by an end user) to <a href="https://mamot.fr/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> a system.”</p><p><a href="https://mamot.fr/tags/Backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backdoor</span></a> <a href="https://mamot.fr/tags/decisions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decisions</span></a> <a href="https://mamot.fr/tags/poisoning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poisoning</span></a> <a href="https://mamot.fr/tags/data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data</span></a> <a href="https://mamot.fr/tags/model" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>model</span></a></p>
Joaquim Homrighausen<p><span class="h-card" translate="no"><a href="https://mastodon.social/@cisene" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cisene</span></a></span> I sincerely hope this has been patched/changed now ... WTAFF?! 😑 </p><p>"Abusing the MS Office protocol scheme"</p><p><a href="https://blog.syss.com/posts/abusing-ms-office-protos/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.syss.com/posts/abusing-ms</span><span class="invisible">-office-protos/</span></a></p><p><a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.online/tags/msoffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msoffice</span></a> <a href="https://mastodon.online/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> <a href="https://mastodon.online/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
heise Security<p>Microsoft: Attacken auf Power Pages, Bing abgesichert</p><p>Angreifer hatten mit Power Pages erstellte Websites im Visier. Schadcode hätte durch Bing-Schwachstelle schlüpfen können.</p><p><a href="https://www.heise.de/news/Microsoft-Attacken-auf-Power-Pages-Bing-abgesichert-10288840.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Attack</span><span class="invisible">en-auf-Power-Pages-Bing-abgesichert-10288840.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Bing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bing</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Jetzt patchen! Sonicwall-Angreifer umgehen Authentifizierung von Firewalls</p><p>Derzeit finden Attacken auf Firewalls von Sonicwall statt. Sicherheitsupdates stehen zum Download bereit. </p><p><a href="https://www.heise.de/news/Jetzt-patchen-Sonicwall-Angreifer-umgehen-Authentifizierung-von-Firewalls-10283899.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-So</span><span class="invisible">nicwall-Angreifer-umgehen-Authentifizierung-von-Firewalls-10283899.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Dell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dell</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Philip Brewer<p>"It's a pretty simple <a href="https://wandering.shop/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a>," the crow said, dropping the cigarette butt on the sidewalk. </p><p>"You figure out what weight tips the device over, then tear the litter into bits just over that size."</p><p>As he spoke, he tore the butt into three pieces, then fed each into the device, collecting three treats.</p><p>"Way simpler than finding three pieces of litter."</p><p><a href="https://wandering.shop/tags/wss366" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wss366</span></a></p>
Steven D. Brewer 🏳️‍⚧️<p>The Baron stood in his field tent surrounded by his officers.<br>"They have fortifications here and here," he said, indicating marks with his finger on the big map sitting on the table. But note the distance between this unit and the ones on either side. We can <a href="https://wandering.shop/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> this weakness." (1/2) <a href="https://wandering.shop/tags/wss366" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wss366</span></a></p>
heise Security<p>Patchday Microsoft: Angreifer attackieren Windows und löschen Daten</p><p>Es sind wichtige Sicherheitsupdates für Azure, Office, Windows und Co. erschienen. Es gibt bereits Attacken. Weitere können bevorstehen. </p><p><a href="https://www.heise.de/news/Patchday-Microsoft-Angreifer-attackieren-Windows-und-loeschen-Daten-10279178.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Patchday-Microso</span><span class="invisible">ft-Angreifer-attackieren-Windows-und-loeschen-Daten-10279178.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>"Passwort" Folge 25: Staatlich sanktionierte Schnüffelsoftware</p><p>Dieses Mal nehmen sich die Podcast-Hosts eines kontroversen Themas an: Unternehmen installieren über Sicherheitslücken Malware - und das in staatlichem Auftrag.</p><p><a href="https://www.heise.de/news/Passwort-Folge-25-Staatlich-sanktionierte-Schnueffelsoftware-10271855.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Passwort-Folge-2</span><span class="invisible">5-Staatlich-sanktionierte-Schnueffelsoftware-10271855.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/PasswortPodcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswortPodcast</span></a> <a href="https://social.heise.de/tags/Pegasus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pegasus</span></a> <a href="https://social.heise.de/tags/Rootkit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rootkit</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>