Introduction
Introduction Statistics Contact Development Disclaimer Help
Posts by [email protected]
Post #AxbZN84qtV40QFB3NA by [email protected]
0 likes, 1 repeats
@struppigel They wonder why people use more Ghidra 🤦🏼‍♂️
Post #AxfGdlawcCvp7XFPyS by [email protected]
0 likes, 1 repeats
@jtk I bet it's because this time, it's not only Amazon's own infra…
Post #AxhXXzROJJrfrWWwOe by [email protected]
0 likes, 0 repeats
I’ve refreshed the “General Methodologies for Intelligence Analysis” sect…
Post #Axn4LIMYuqFp3rcqg4 by [email protected]
0 likes, 1 repeats
Draugnet is a lightweight, open-source tool for anonymous cyber threat reportin…
Post #Axn4cCsiY4g8z4jKIS by [email protected]
0 likes, 1 repeats
@gzobra I will add it. Still wondering about the license by the way as it seems…
Post #Ay2dUTRxTVsbouf1iS by [email protected]
0 likes, 1 repeats
After seeing a workshop using a crappy pseudo/proprietary forensic web capture …
Post #Ay7YEXIzqR6fADqjGy by [email protected]
0 likes, 1 repeats
@cedric I hope it’s final in the good sense with new improvements for the yea…
Post #AyGfd2LqW49gVFS3qi by [email protected]
0 likes, 1 repeats
I’m sad about Robert Redford’s passing. I’ve always loved the movie Sneak…
Post #AyH0F9mLLd9dcsIeKu by [email protected]
0 likes, 1 repeats
A CVE should be assigned whenever an attacker publishes a malicious package upd…
Post #AyHmPV4dp7SoMprA2K by [email protected]
0 likes, 1 repeats
@apth Indeed, we’ve seen some assignments for certain package maintainers, bu…
Post #AyO7MfiT3xUmUVjlIW by [email protected]
0 likes, 1 repeats
@Neko0001 @goofy Merci 🙏
Post #AyOVAuptQ6B0oE8ZVI by [email protected]
0 likes, 1 repeats
Collins Aerospace (RTX) was already targeted by ransomware in 2023 by BianLian …
Post #AyOVn4QWD5iPYgSiR6 by [email protected]
0 likes, 1 repeats
https://www.ransomlook.io/screenshots/bianlian/Collins%20Aerospace%20%28An%20RT…
Post #AyQRrvyv1daLJVXJ3o by [email protected]
0 likes, 1 repeats
@tnoisette C’est amusant de voir le ciblage continu sur la Chine. Une majorit…
Post #AyWqMusCl9VChZSgSW by [email protected]
0 likes, 1 repeats
Seeing is Deceiving: Mirror-Based LiDAR Spoofing for Autonomous Vehicle Decepti…
Post #Ayi2WO5aqC2q6mZ8ue by [email protected]
0 likes, 1 repeats
💬 All talks and workshops from #hacklu2025 have their own Discourse topic �…
Post #AyjiKymiyJlffxwVfM by [email protected]
0 likes, 1 repeats
@otmar 👆
Post #AylZjWkbpQjohKVHzE by [email protected]
0 likes, 1 repeats
A new open source cyber-range platform released at the @oscl and presented at t…
Post #AyqDDesKrLchQbJdoG by [email protected]
0 likes, 0 repeats
I see some people with high expectations for the EU CRA regulation, thinking th…
Post #AyqDDf6rzJFW9g7FSq by [email protected]
0 likes, 0 repeats
@fedops Let's hope the shift is not only about the compliance aspect. I can…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.