netsec

ramble81 , in Bypassing CSP with Form Hijacking

And that’s why you make sure you have sanitization checks on the backed too. From end should just provide your users with quicker feedback and save on network traffic. The backend should prevent anything from actually being executed that shouldn’t. That way it doesn’t matter how it gets submitted. Same if you were have a UI and API. The API may get inputs outside of a UI so you should have your checks there.

Hominine , in Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex
@Hominine@lemmy.world avatar

So are they hiring or what?

Jean_Lurk_Picard , in Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex
@Jean_Lurk_Picard@lemmy.world avatar

Great article.

SzethFriendOfNimi , in Decoding ScamClub’s Malicious VAST Attack

Misread that as ScamSchool at first and I was like what did Brian Bushwood do?

warmaster , in Introducing WebTunnel | Tor Project

So, is this like Cloudflare Tunnels ?

finickydesert , in Oauth implementation flaws allow access to private repos via ChatGPT plugins
@finickydesert@lemmy.ml avatar

I guess my Fizzbuzz repo is now compromised

keefshape , in Open Source - Terminal based AI Powered Ethical Hacking Assistant.

Sou died like a neat idea. I clicked the link, greeted with

First i would like to thank the All-Mighty God who is the source of all knowledge, without Him, this would not be possible.

Closed the link.

wreckedcarzz , in Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awareness
@wreckedcarzz@lemmy.world avatar

play audio [...] without user awareness

Does this vulnerability also make the user deaf, orrrrr...?

elshandra ,

Just skate over the "record and" there.

Steamymoomilk ,
@Steamymoomilk@sh.itjust.works avatar

starts blasting dmc's its tricky

snekerpimp , in Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awareness

I have had this happen to me, driving down the road and had my radio just start playing someone else’s music. Get further down the road and it stops as sudden as it started. Wonder if this was the culprit?

Anamana ,

If you had the radio on, then there is also the possibility they just used an FM-Transmitter to send audio signals from their smartphone to their car radio and you were on the same frequency.

snekerpimp ,

Should have clarified, listening to my Bluetooth car stereo connected to my phone. Shouldn’t have used antiquated language.

Anamana ,

Ah oki, maybe it was a friend of yours passing by then ;)

9point6 , in Side-Channel Attack on Apple M1 Chip Prefetcher (GoFetch)

Potentially exploitable on all M-series chips

Big oof. Are we going to see spectre/meltdown-like performance nerfing to mitigate this I wonder

acetanilide , in Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speaker without user awareness

Could this happen with bluetooth enabled hearing aids? I think mine are still discoverable when connected.

Shivering6658 , in GitHub - ZephrFish/ChunkyIngress: Chunking Text Ingress

Upvote because powershell

Heavybell , in GitHub - TracecatHQ/tracecat: 😼 The AI-native, open source alternative to Tines / Splunk SOAR.
@Heavybell@lemmy.world avatar

So what does "AI-native" mean, exactly?

devilish666 , in Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu - Exodus Intelligence

I never know that Linux can be hacked, although you need extra work for that since the security is high

optissima , in IBIS hotel check-in terminal keypad-code leakage

IBS terminal leakage is the worst.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • netsec@lemmy.world
  • test
  • worldmews
  • mews
  • All magazines