Explore >> Select a destination


You are here

gnn.vircom.in
| | taeluralexis.com
2.7 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | www.syntaxbearror.io
2.7 parsecs away

Travel
| | Supply Chain Attack on MSPs leave thousands with ransomware, Print Spooler woes continue with Windows, and more on this week's episode of Bear Security.
| | sparklekitten.net
2.6 parsecs away

Travel
| | [AI summary] The article discusses various cybersecurity threats, including Microsoft OS migration recommendations, the 3CX supply chain attack, ESXi targeting by ransomware, Illumina device vulnerabilities, and recent vulnerabilities like the VEEAM Backup and Cisco Prime Collaboration Deployment zero-day exploits.
| | statuscode.ch
12.3 parsecs away

Travel
| Recently I took a look atAtom, a text editor by GitHub. With a little bit of work, I was able to chain multiple vulnerabilities in Atom into an actual Remote Code Execution. The vulnerabilities have been fixed in the1.21.1 release on October 12th, 2017after I reported it via theirHackerOne program. In case you want to...