@anon
sign up
@anon
sign up
pull down to refresh
Hacking Systems via Exposed ETCD Instances
rootedsec.io/pages/posts/08-04-24/hacking-etcd.html
250 sats
\
0 comments
\
@r3drun3
8 Apr 2024
security
related
New Linux glibc flaw lets attackers get root on major distros
www.bleepingcomputer.com/news/security/new-linux-glibc-flaw-lets-attackers-get-root-on-major-distros/
731 sats
\
11 comments
\
@ch0k1
1 Feb 2024
security
Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems
cybersecuritynews.com/critical-unauthenticated-rce-flaw/
349 sats
\
1 comment
\
@ch0k1
24 Sep 2024
news
OilRig Hackers Exploiting Windows Kernel 0-day to Attack Organizations
cybersecuritynews.com/oilrig-hackers-windows-kernel-0-day/
11 sats
\
0 comments
\
@ch0k1
25 Dec 2024
security
State-of-the-Art Redis Malware Bypasses Security Solutions to Hack Servers
gbhackers.com/state-of-the-art-redis-malware/
22 sats
\
0 comments
\
@ch0k1
4 Feb 2024
security
Intel’s Memory Leak Nightmare: 5,000 Bytes per Second in the Hands of Hackers
scitechdaily.com/intels-memory-leak-nightmare-5000-bytes-per-second-in-the-hands-of-hackers/
40 sats
\
0 comments
\
@ch0k1
23 May
news
ECASH HACKDAY
ecashhackday.github.io/
582 sats
\
0 comments
\
@Rsync25
15 Sep 2023
bitcoin
Hack Your First Machine – A Guide for Aspiring Security Enthusiasts
www.freecodecamp.org/news/hack-your-first-machine-a-guide-for-aspiring-security-enthusiasts/
21 sats
\
0 comments
\
@Rsync25
6 Oct 2024
tech
Ethernet For Hackers: The Very Basics
hackaday.com/2024/02/12/ethernet-for-hackers-the-very-basics/
156 sats
\
0 comments
\
@shadowymartian
20 Feb 2024
devs
Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Envs
unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/
120 sats
\
0 comments
\
@aljaz
19 Aug 2024
security
The Insecurity of Debian
unix.foo/posts/insecurity-of-debian/
132 sats
\
1 comment
\
@hn
4 Sep 2024
tech
Attacking UNIX Systems via CUPS, Part I
www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
3757 sats
\
5 comments
\
@0xB10C
26 Sep 2024
security
Linux Kernel Vulnerability Let Attackers Escalate Privilege - PoC Released
cybersecuritynews.com/linux-kernel-vulnerability-escalate-privilege/
36 sats
\
0 comments
\
@ch0k1
23 Apr
security
The ESP32 Bluetooth Backdoor That Wasn’t
hackaday.com/2025/03/10/the-esp32-bluetooth-backdoor-that-wasnt/
230 sats
\
1 comment
\
@ch0k1
10 Mar
security
Hugging Face, the GitHub of AI, Hosted Code That Backdoored User Devices
arstechnica.com/security/2024/03/hugging-face-the-github-of-ai-hosted-code-that-backdoored-user-devices/
71 sats
\
1 comment
\
@0xbitcoiner
3 Mar 2024
security
P-Hacking in Startups
briefer.cloud/blog/posts/p-hacking/
10 sats
\
0 comments
\
@hn
24 Jun
tech
ZimaBoard - Hackable Single Board Server
www.zimaboard.com/
154 sats
\
1 comment
\
@kristapsk
30 Oct 2023
tech
Intel-powered computers affected by serious firmware flaw (CVE-2024-0762)
www.helpnetsecurity.com/2024/06/21/cve-2024-0762/
114 sats
\
0 comments
\
@ch0k1
22 Jun 2024
news
20-Year-Old macOS Vulnerability Allows Attackers To Gain Root Access Remotely
cybersecuritynews.com/20-years-old-macos-vulnerability/
80 sats
\
6 comments
\
@ch0k1
28 Nov 2024
security
Linux maintainers were infected for 2 years by SSH-dwelling backdoor
arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/
131 sats
\
0 comments
\
@DEADBEEF
15 May 2024
security
Magnet Goblin hackers use 1-day flaws to drop custom Linux malware
www.bleepingcomputer.com/news/security/magnet-goblin-hackers-use-1-day-flaws-to-drop-custom-linux-malware/
61 sats
\
2 comments
\
@ch0k1
9 Mar 2024
security
Hackers Weaponized Free SSH Client Putty to Attack Windows Systems With Malware
cybersecuritynews.com/hackers-weaponized-free-ssh-client-putty/amp/?fbclid=IwY2xjawKrqwRleHRuA2FlbQIxMQABHuPfAQ66mFpQTzghr6hIz0bZuSYaJyTRMMMm2aqPFEO9FqeksaFDgc5nyQtx_aem_wguTlX9JbsTX_InCWyJuMw
10 sats
\
0 comments
\
@ch0k1
3 Jun
news
more