Posts
2575
Following
624
Followers
1379
"I'm interested in all kinds of astronomy."
repeated

"The economic value of the outgoing traffic... based on the cost-per-click estimated via the Google Ads platform showed that the owners of external websites linked from Wikipedia infoboxes would need to collectively
pay a total of around $7-13 million per month (or $84-156 million per year) to obtain the same volume of traffic as they receive from Wikipedia for free."

!!

0
2
0
repeated

Taking his previous research to the next level, our Maxence Schmitt explores how to bypass various upload restrictions to exploit client-side path traversal. Read about it in our latest blog post today!

https://blog.doyensec.com/2025/01/09/cspt-file-upload.html

0
4
0
repeated
@cfgbot file renaming is hard! /cc @gergelykalman
0
0
0
repeated
repeated
Edited 2 months ago

Hearing about a young hacker whose being extorted by the University of Washington, not cool UW.

The student claims they built an app to help kids get the course schedules they want, a hack as old as time, and the university decided to expel him until he ports his app to the university's internal systems.

This would be unpaid labor.

Until then his class registration is on hold and he can't register or attend his last few classes. šŸ„“

https://www.linkedin.com/posts/jdkaim_github-jdkaimhuskyswap-huskyswap-project-activity-7282891503142641664-nA8Y

9
17
1
repeated

Computer History Museum šŸ‡øšŸ‡®

šŸŽ‚šŸ—» Looking for simh/DEC J-11 experts to volunteer for our project of developing a libre emulator of the Slovenian Iskra Delta Triglav computer which is celebrating 40 years! We have ROM and disk images (RSX11-M/DELTA-M OS) and lots of documentation. Interested? šŸ‘‰ marko@muzej.si

0
1
0
repeated
repeated
repeated

Why You Probably Don't Need A VPN To Stay Secure On Public Wi-Fi

You've probably heard advice about how hackers can steal all your sensitive information if you don't use a VPN on public Wi-Fi, but is that actually true? In this video I'll walk through some of the major risks of public Wi-Fi such as Man-In-The-Middle Attacks, Rogue Access Points, SSL Stripping, and TLS Downgrades, as well as discuss how modern security measures prevent them.
https://www.youtube.com/watch?v=i7GwjGGwxzg

3
8
1
repeated
repeated
repeated

New Connect Secure ā€” I'm sure we'll see Mandiant and MSTIC write-ups shortly on whichever threat campaign/actor was hitting CVE-2025-0282. https://www.rapid7.com/blog/post/2025/01/08/etr-cve-2025-0282-ivanti-connect-secure-zero-day-exploited-in-the-wild/

1
2
0
repeated

Blortā„¢ šŸ€ā“‹šŸ„‹ā˜£ļø

I'm very happy to see @kagihq joining Peertube with their inaugural video below about what makes Kagi independent search special!

https://tilvids.com/w/twGQeYV9c1TGwMmbdXtY2q

Remember to follow their Peertube account at @kagi and boost to encourage and show them the effort is appreciated! Also do check out their excellent lenses feature, shown in the video.

0
3
0
[RSS] Two Network-related vunlnerabilities Analysis

https://u1f383.github.io/linux/2025/01/08/two-network-related-vulnerabilities-analysis.html

#Linux kernel - CVE-2023-6932 CVE-2023-0461
0
1
0
[RSS] Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

https://www.netspi.com/blog/technical-blog/cloud-pentesting/hijacking-azure-machine-learning-notebooks/
0
0
0
repeated

GitLab security advisory 08 January 2025: GitLab Patch Release: 17.7.1, 17.6.3, 17.5.5

  • CVE-2025-0194 (6.5 medium) Possible access token exposure in GitLab logs
  • CVE-2024-6324 (4.3 medium) Cyclic reference of epics leads resource exhaustion
  • CVE-2024-12431 (4.3 medium) Unauthorized user can manipulate status of issues in public projects
  • CVE-2024-13041 (4.3 medium) Instance SAML does not respect external_provider configuration

No mention of exploitation

1
2
0
@jerry Can't verify it's really you with shoes on
1
0
3
repeated

Hi all. Given the recent announcement from Meta about AI personas and allowed behavior, I am moving threads.net back to a limit, and will likely move them to a block in the future on infosec.exchange. I canā€™t ignore the reality that the changes theyā€™re making are specifically intended to permit attacks on many of the people that call this place home. I wonā€™t rule out that they walk the changes back, which is why Iā€™m not jumping to sever the nearly 4000 mutual follow relationships between people on threads and here.

25
18
1
repeated

šŸšØ Deadline Extended šŸšØ

By popular demand, the submission deadline is now January 14, 2025 (AoE)! šŸ—“ļø

You still have 1 week to send your papers and join us in San Diego!

šŸ“œ Submit here: https://madweb25.hotcrp.com
šŸ”— Details: https://madweb.work

Spread the word!

0
2
0
Show older