ruby.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
If you are interested in the Ruby programming language, come join us! Tell us about yourself when signing up. If you just want to join Mastodon, another server will be a better place for you.

Administered by:

Server stats:

1.1K
active users

#exploit

4 posts4 participants0 posts today
Hacker News<p>One Bug Wasn't Enough: Escalating Twice Through SAP's Setuid Landscape</p><p><a href="https://www.anvilsecure.com/blog/one-bug-wasnt-enough-escalating-twice-through-saps-setuid-landscape.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">anvilsecure.com/blog/one-bug-w</span><span class="invisible">asnt-enough-escalating-twice-through-saps-setuid-landscape.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/OneBugWasntEnough" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OneBugWasntEnough</span></a> <a href="https://mastodon.social/tags/SAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAP</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Setuid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Setuid</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
heise online English<p>Patchday: Attackers attack Windows and gain system rights</p><p>Microsoft has provided important security patches for Azure, Bitlocker and Kerberos, among others, via Windows Update. </p><p><a href="https://www.heise.de/en/news/Patchday-Attackers-attack-Windows-and-gain-system-rights-10345601.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Patchday-Atta</span><span class="invisible">ckers-attack-Windows-and-gain-system-rights-10345601.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Patchday: Angreifer attackieren Windows und verschaffen sich System-Rechte</p><p>Microsoft hat über Windows Update wichtige Sicherheitspatches für unter anderem Azure, Bitlocker und Kerberos bereitgestellt. </p><p><a href="https://www.heise.de/news/Patchday-Angreifer-attackieren-Windows-und-verschaffen-sich-System-Rechte-10345516.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Patchday-Angreif</span><span class="invisible">er-attackieren-Windows-und-verschaffen-sich-System-Rechte-10345516.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
CEOTECH.IT<p>Google rilascia un update Android per 2 bug zero-day critici<br><a href="https://mastodon.social/tags/Aggiornamenti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Aggiornamenti</span></a> <a href="https://mastodon.social/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://mastodon.social/tags/AOSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AOSP</span></a> <a href="https://mastodon.social/tags/BugFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugFix</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://mastodon.social/tags/Notizie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Notizie</span></a> <a href="https://mastodon.social/tags/PatchDiSicurezza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchDiSicurezza</span></a> <a href="https://mastodon.social/tags/Sicurezza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicurezza</span></a> <a href="https://mastodon.social/tags/Smartphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smartphone</span></a> <a href="https://mastodon.social/tags/Tablet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tablet</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/Tecnologia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tecnologia</span></a> <a href="https://mastodon.social/tags/Update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Update</span></a> <a href="https://mastodon.social/tags/Vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilità</span></a> <a href="https://mastodon.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> </p><p><a href="https://www.ceotech.it/google-rilascia-un-update-android-per-2-bug-zero-day-critici/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ceotech.it/google-rilascia-un-</span><span class="invisible">update-android-per-2-bug-zero-day-critici/</span></a></p>
Rod2ik 🇪🇺 🇨🇵 🇪🇸 🇺🇦 🇨🇦 🇩🇰 🇬🇱<p>« Un <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/spatial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spatial</span></a> <a href="https://mastodon.social/tags/historique" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>historique</span></a> » : <a href="https://mastodon.social/tags/Airbus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Airbus</span></a> réussit l’atterrissage du tout premier <a href="https://mastodon.social/tags/rover" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rover</span></a> <a href="https://mastodon.social/tags/europ%C3%A9en" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>européen</span></a> sur <a href="https://mastodon.social/tags/Mars" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mars</span></a>, une avancée géante pour l’ <a href="https://mastodon.social/tags/humanit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>humanité</span></a></p><p><a href="https://www.innovant.fr/2025/04/02/un-exploit-spatial-historique-airbus-reussit-latterrissage-du-tout-premier-rover-europeen-sur-mars-une-avancee-geante-pour-lhumanite/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">innovant.fr/2025/04/02/un-expl</span><span class="invisible">oit-spatial-historique-airbus-reussit-latterrissage-du-tout-premier-rover-europeen-sur-mars-une-avancee-geante-pour-lhumanite/</span></a></p>
heise online English<p>Apache Tomcat: Attacks on critical security vulnerability ongoing</p><p>A critical vulnerability in Apache Tomcat allows malicious code to be injected. This is exactly what attackers are currently doing.</p><p><a href="https://www.heise.de/en/news/Apache-Tomcat-Attacks-on-critical-security-vulnerability-ongoing-10338517.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Apache-Tomcat</span><span class="invisible">-Attacks-on-critical-security-vulnerability-ongoing-10338517.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Apache Tomcat: Angriffe auf kritische Sicherheitslücke laufen</p><p>Eine kritische Sicherheitslücke in Apache Tomcat ermöglicht das Einschleusen von Schadcode. Genau das machen Angreifer derzeit.</p><p><a href="https://www.heise.de/news/Apache-Tomcat-Angriffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Apache-Tomcat-An</span><span class="invisible">griffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online English<p>Attacks on security leak in CrushFTP observed</p><p>Last week, a security vulnerability was discovered in the CrushFTP data transfer software. IT researchers are now observing attacks on it.</p><p><a href="https://www.heise.de/en/news/Attacks-on-security-leak-in-CrushFTP-observed-10336981.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Attacks-on-se</span><span class="invisible">curity-leak-in-CrushFTP-observed-10336981.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Angriffe auf Sicherheitsleck in CrushFTP beobachtet</p><p>Vergangene Woche wurde eine Sicherheitslücke in der Datentransfer-Software CrushFTP bekannt. IT-Forscher beobachten nun Angriffe darauf.</p><p><a href="https://www.heise.de/news/Angriffe-auf-Sicherheitsleck-in-CrushFTP-beobachtet-10336787.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Angriffe-auf-Sic</span><span class="invisible">herheitsleck-in-CrushFTP-beobachtet-10336787.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online English<p>CISA warns of "Resurge" malware after Ivanti ICS attacks</p><p>Attacks on Ivanti's ICS have been known since the beginning of January. CISA has analyzed the malware that attackers have installed.</p><p><a href="https://www.heise.de/en/news/CISA-warns-of-Resurge-malware-after-Ivanti-ICS-attacks-10333964.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/CISA-warns-of</span><span class="invisible">-Resurge-malware-after-Ivanti-ICS-attacks-10333964.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>CISA warnt vor Malware "Resurge" nach Ivanti-ICS-Attacken</p><p>Seit Anfang Januar sind Angriffe auf Ivantis ICS bekannt. Die CISA hat die Malware analysiert, die Angreifer installiert haben.</p><p><a href="https://www.heise.de/news/CISA-warnt-vor-Malware-Resurge-nach-Ivanti-ICS-Attacken-10333868.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CISA-warnt-vor-M</span><span class="invisible">alware-Resurge-nach-Ivanti-ICS-Attacken-10333868.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Hacker News<p>Blasting Past WebP - An analysis of the NSO BLASTPASS iMessage exploit</p><p><a href="https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">googleprojectzero.blogspot.com</span><span class="invisible">/2025/03/blasting-past-webp.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Blasting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blasting</span></a> <a href="https://mastodon.social/tags/Past" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Past</span></a> <a href="https://mastodon.social/tags/WebP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebP</span></a> <a href="https://mastodon.social/tags/An" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>An</span></a> <a href="https://mastodon.social/tags/analysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>analysis</span></a> <a href="https://mastodon.social/tags/of" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>of</span></a> <a href="https://mastodon.social/tags/the" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>the</span></a> <a href="https://mastodon.social/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a> <a href="https://mastodon.social/tags/BLASTPASS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BLASTPASS</span></a> <a href="https://mastodon.social/tags/iMessage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iMessage</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/analysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>analysis</span></a> <a href="https://mastodon.social/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a></p>
Blue DeviL // SCT<p>The Path Towards Automated Heap Exploitation</p><p>CC: Thaís Moreira Hamasaki</p><p><a href="https://www.youtube.com/watch?v=5XQ0cAwlWMo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=5XQ0cAwlWMo</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/heap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heap</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a></p>
heise online English<p>Update now! Zero-day security vulnerability in Chrome is under attack</p><p>Google has released an update for the Chrome web browser. It closes a zero-day vulnerability that is already under attack.</p><p><a href="https://www.heise.de/en/news/Update-now-Zero-day-security-vulnerability-in-Chrome-is-under-attack-10328792.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Update-now-Ze</span><span class="invisible">ro-day-security-vulnerability-in-Chrome-is-under-attack-10328792.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Hacker News<p>Heap-overflowing Llama.cpp to RCE</p><p><a href="https://retr0.blog/blog/llama-rpc-rce" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">retr0.blog/blog/llama-rpc-rce</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/HeapOverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HeapOverflow</span></a> <a href="https://mastodon.social/tags/LlamaCpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LlamaCpp</span></a> <a href="https://mastodon.social/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
Joaquim Homrighausen<p>Time to update Chrome 🕵️ 🔒 </p><p><a href="https://thehackernews.com/2025/03/zero-day-alert-google-releases-chrome.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/zero</span><span class="invisible">-day-alert-google-releases-chrome.html</span></a></p><p><a href="https://mastodon.online/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://mastodon.online/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://mastodon.online/tags/webbrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webbrowser</span></a> <a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://mastodon.online/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
heise Security<p>Jetzt updaten! Zero-Day-Sicherheitslücke in Chrome wird angegriffen</p><p>Google hat dem Webbrowser Chrome ein Update spendiert. Es schließt eine Zero-Day-Lücke, die bereits angegriffen wird.</p><p><a href="https://www.heise.de/news/Jetzt-updaten-Zero-Day-Sicherheitsluecke-in-Chrome-wird-angegriffen-10328773.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-updaten-Ze</span><span class="invisible">ro-Day-Sicherheitsluecke-in-Chrome-wird-angegriffen-10328773.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
packet storm<p>Microsoft Windows NTLM Hask Leak <a href="https://packetstorm.news/files/189977" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/189977</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
heise online English<p>Jetzt patchen! Angreifer attackieren Nakivo Backup &amp; Replication Director</p><p>Attackers are exploiting a security vulnerability in the backup solution Nakivo Backup &amp; Replication Director. A security patch is available.</p><p><a href="https://www.heise.de/en/news/Jetzt-patchen-Angreifer-attackieren-Nakivo-Backup-Replication-Director-10324258.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Jetzt-patchen</span><span class="invisible">-Angreifer-attackieren-Nakivo-Backup-Replication-Director-10324258.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online English<p>Attackers exploit backdoor in Cisco Smart Licensing Utility</p><p>Patch now! Attackers gain admin access to Cisco Smart Licensing Utility.</p><p><a href="https://www.heise.de/en/news/Attackers-exploit-backdoor-in-Cisco-Smart-Licensing-Utility-10324063.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Attackers-exp</span><span class="invisible">loit-backdoor-in-Cisco-Smart-Licensing-Utility-10324063.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>