JackFromWisconsinA · 2 years agoWeb Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and Moreplus-squaresamcurry.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWeb Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and Moreplus-squaresamcurry.netJackFromWisconsinA · 2 years agomessage-square0fedilink
Canard@sopuli.xyz · 2 years agoGoogle Home speakers allowed hackers to snoop on conversationsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Home speakers allowed hackers to snoop on conversationsplus-squarewww.bleepingcomputer.comCanard@sopuli.xyz · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoAlleged Chinese state-sponsored group hacked certificate authority, gov’t agencies in Asiaplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkAlleged Chinese state-sponsored group hacked certificate authority, gov’t agencies in Asiaplus-squaretherecord.mediac0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoStealing passwords from infosec Mastodon - without bypassing CSPplus-squareportswigger.netexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkStealing passwords from infosec Mastodon - without bypassing CSPplus-squareportswigger.netc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoOSINT Pro Tips: A Collection of useful OSINT tips and tricksplus-squareohshint.gitbook.ioexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkOSINT Pro Tips: A Collection of useful OSINT tips and tricksplus-squareohshint.gitbook.ioc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
Canard@sopuli.xyz · 2 years agoCyber Resilience Actplus-squaredigital-strategy.ec.europa.euexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkCyber Resilience Actplus-squaredigital-strategy.ec.europa.euCanard@sopuli.xyz · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoSHA-3 Buffer Overflowplus-squaremouha.beexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkSHA-3 Buffer Overflowplus-squaremouha.bec0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · edit-22 years agoA brief and informal analysis of F-Droid securityplus-squarewonderfall.devexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA brief and informal analysis of F-Droid securityplus-squarewonderfall.devc0mmando@community.hackliberty.orgM · edit-22 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoRussian Citizens Wage Cyberwar From Withinplus-squarewww.kyivpost.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkRussian Citizens Wage Cyberwar From Withinplus-squarewww.kyivpost.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoA Collection of Articles About Hardening Linuxplus-squaredarknetlive.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA Collection of Articles About Hardening Linuxplus-squaredarknetlive.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoUber suffers catastrophic 'security incident’plus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkUber suffers catastrophic 'security incident’plus-squarewww.theregister.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoLastPass data breach: threat actors stole a portion of source codeplus-squareblog.lastpass.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkLastPass data breach: threat actors stole a portion of source codeplus-squareblog.lastpass.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoOkta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizationsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkOkta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizationsplus-squarethehackernews.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoAn Open Source apps Leads to XSS to RCE Vulnerability Flawsplus-squaretutorialboy24.blogspot.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkAn Open Source apps Leads to XSS to RCE Vulnerability Flawsplus-squaretutorialboy24.blogspot.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoA Mass Exploitation of Unauthenticated Zimbra RCE -- CVE-2022-27925plus-squaretutorialboy24.blogspot.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA Mass Exploitation of Unauthenticated Zimbra RCE -- CVE-2022-27925plus-squaretutorialboy24.blogspot.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoHow To Exploit PHP Remotely To Bypass Filters & WAF Rulesplus-squaretutorialboy24.blogspot.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHow To Exploit PHP Remotely To Bypass Filters & WAF Rulesplus-squaretutorialboy24.blogspot.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoA Heap Buffer Overflow in the Linux Kernal Leads to Root Privileges - CVE-2022-34918plus-squaretutorialboy24.blogspot.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA Heap Buffer Overflow in the Linux Kernal Leads to Root Privileges - CVE-2022-34918plus-squaretutorialboy24.blogspot.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoSophos XG Firewall Authentication bypass allowing Remote Code Execution - CVE-2022-1040plus-squaretutorialboy24.blogspot.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkSophos XG Firewall Authentication bypass allowing Remote Code Execution - CVE-2022-1040plus-squaretutorialboy24.blogspot.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoA Rolling-PWN Attack Vulnerability Leads to Unlock or Start Vehicles Remotely - CVE-2022-27254plus-squaretutorialboy24.blogspot.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA Rolling-PWN Attack Vulnerability Leads to Unlock or Start Vehicles Remotely - CVE-2022-27254plus-squaretutorialboy24.blogspot.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink
c0mmando@community.hackliberty.orgM · 2 years agoAn OGNL Injection Remote Code Execution (RCE) Vulnerability on Atlassian Confluence (CVE-2022-26134)plus-squaretutorialboy24.blogspot.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkAn OGNL Injection Remote Code Execution (RCE) Vulnerability on Atlassian Confluence (CVE-2022-26134)plus-squaretutorialboy24.blogspot.comc0mmando@community.hackliberty.orgM · 2 years agomessage-square0fedilink