| 31. | | The Treasures of Crash Reports (objective-see.org) |
| 3 points by based2 on Sept 29, 2024 | past |
|
| 32. | | Enisa Threat Landscape 2024 (europa.eu) |
| 1 point by based2 on Sept 28, 2024 | past |
|
| 33. | | CVE-2024-6104 go-retryablehttp (nist.gov) |
| 2 points by based2 on Sept 28, 2024 | past |
|
| 34. | | Forward Secrecy (wikipedia.org) |
| 3 points by based2 on Sept 28, 2024 | past |
|
| 35. | | CosmicBeetle joins the ranks of RansomHub affiliates (welivesecurity.com) |
| 1 point by based2 on Sept 28, 2024 | past |
|
| 36. | | Disgomoji Malware Used to Target Indian Government (volexity.com) |
| 1 point by based2 on Sept 28, 2024 | past |
|
| 37. | | Hyundai Faces New Theft Threat from "Game Boy" Hack (headlight.news) |
| 16 points by based2 on Sept 28, 2024 | past | 22 comments |
|
| 38. | | Insecurity Through Censorship: Vulnerabilities Caused by the Great Firewall (assetnote.io) |
| 3 points by based2 on Sept 28, 2024 | past | 1 comment |
|
| 39. | | Red.flag.domains (flag.domains) |
| 7 points by based2 on Sept 28, 2024 | past | 1 comment |
|
| 40. | | StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms (volexity.com) |
| 3 points by based2 on Sept 28, 2024 | past |
|
| 41. | | Storm-0501: Ransomware attacks expanding to hybrid cloud environments (microsoft.com) |
| 2 points by based2 on Sept 28, 2024 | past |
|
| 42. | | Malware Coordination Using the Blockchain: An Analysis of the Cerber Ransomware (researchgate.net) |
| 3 points by based2 on Sept 28, 2024 | past | 1 comment |
|
| 43. | | An introduction to large language models and their relevance for statistical (europa.eu) |
| 1 point by based2 on Sept 28, 2024 | past |
|
| 44. | | The not-so-silent type (citizenlab.ca) |
| 1 point by based2 on July 29, 2024 | past |
|
| 45. | | Honeypots: Focus on CVE-2024-3273 (tehtris.com) |
| 3 points by based2 on July 29, 2024 | past |
|
| 46. | | Unplugging PlugX: Sinkholing the PlugX USB Worm Botnet (sekoia.io) |
| 1 point by based2 on July 25, 2024 | past |
|
| 47. | | R language flaw allows code execution via RDS/RDX files (bleepingcomputer.com) |
| 2 points by based2 on April 30, 2024 | past |
|
| 48. | | JFrog research discovers coordinated attacks on Docker Hub that planted millions (jfrog.com) |
| 47 points by based2 on April 30, 2024 | past | 4 comments |
|
| 49. | | Red Flag Domains: malicious domain names in French TLDs (flag.domains) |
| 1 point by based2 on Feb 4, 2024 | past |
|
| 50. | | Mastodon vulnerability allows attackers to take over accounts (bleepingcomputer.com) |
| 2 points by based2 on Feb 4, 2024 | past |
|
| 51. | | Openbao Vault (lfedge.org) |
| 1 point by based2 on Dec 8, 2023 | past | 1 comment |
|
| 52. | | Atomic Rocket (projectrho.com) |
| 125 points by based2 on Oct 22, 2023 | past | 64 comments |
|
| 53. | | Catch drift outside of your infrastructure code (driftctl.com) |
| 2 points by based2 on July 2, 2023 | past | 1 comment |
|
| 54. | | Researchers develop 'noise-canceling' qubits to minimize errors in quantum compu (phys.org) |
| 2 points by based2 on June 11, 2023 | past | 1 comment |
|
| 55. | | Get helpful context with About this image (blog.google) |
| 1 point by based2 on June 11, 2023 | past |
|
| 56. | | What is low-rank adaptation – LoRA? (bdtechtalks.com) |
| 2 points by based2 on June 11, 2023 | past |
|
| 57. | | Chien-Shiung Wu (wikipedia.org) |
| 1 point by based2 on June 11, 2023 | past |
|
| 58. | | Aspect's Experiment (wikipedia.org) |
| 1 point by based2 on June 11, 2023 | past |
|
| 59. | | OpenJDK 21 Early access builds (java.net) |
| 3 points by based2 on June 10, 2023 | past |
|
| 60. | | Keepass: 2.54 - fix CVE-2023-3278 (keepass.info) |
| 2 points by based2 on June 10, 2023 | past | 1 comment |
|
|
| More |