CVE-2026-3784 beat a new #curl record. This flaw existed in curl source code for 24.97 years before it was discovered.
Illustrated in the slightly hard-to-read graph below. The average age of a curl vulnerability when reported is eight years.
Me? Trolling the other microcontroller vendors? Surely not! Maybe if they had bothered to do something about the most common source of vulnerabilities at some point in the last few decades, the could have been on the other side of the sign...
RIP Tony Hoare. His obituaries are talking about quicksort, but I think his most notable accomplishments are Communicating Sequential Processes, the Occam programming language, and the Transputer, an early example of a parallel processor
https://blog.computationalcomplexity.org/2026/03/tony-hoare-1934-2026.html?m=1
@tito_swineflu That being said they are taking the threat seriously in the past. In 2021 I was lucky enough to catch the F-117s deployment to Fresno to train with the 144th. One of the purposes was for the Nighthawks to simulate stealthy aircraft / drones for the F-15 to practice against. Here are some of the pics and the article has a more detailed description and more of my shots
5,200 holes carved into a Peruvian mountain left by an ancient economy
Has anyone tried to feed it into a PDP11 as a punch card yet? If I found anything old with holes in it, I would definitely see if it is a FORTRAN program.
NEW: A hacker broke into a server at the Child Exploitation Forensic Lab in the FBI’s New York Field Office and compromised files related to the Epstein investigation, as first reported by Reuters.
“Following the 2023 cyber incident, the FBI contained the affected network and determined the incident to be an isolated one. The FBI restricted access to the malicious actor and rectified the network,” an FBI spokesperson said.
https://techcrunch.com/2026/03/11/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/
RE: https://ec.social-network.europa.eu/@EUCommission/116211334179600320
this is a meme and not in the good meaning of the word
even less than GAIA-X, just rofl :/
SCOOP: The iPhone mass hacking toolkit used by Russian spies was developed at U.S. military contractor L3Harris, former employees said.
The Coruna toolkit was used against Ukrainians during the war and by Chinese cybercriminals, according to Google.
But the toolkit was initially developed for governments in the Five Eyes spy alliance, and it was used in Operation Triangulation, according to one source.