New: exploitsAll contenthive-129948krhive-196917zzansteemhive-183959hive-166405hive-185836hive-180932photographyuncommonlabhive-183397hive-150122hive-101145hive-188619hive-144064bitcoinkrsuccesshive-145157lifehive-193637hive-184714hive-181136hive-109690hive-103599TrendingNewHotLikerssecpoint (49)in secpoint • 5 months agoSecPoint Protector UTM Firewall - Blocking Exploits and MalwareSecPoint Protector UTM Firewall - Blocking Exploits and Malware #secpoint #exploits #malware #cybersecurity #networksecuritysteveezekiel (52)in hive-196037 • 8 months agoBEING STRONG TO DO EXPLOITS"THOSE who do wickedly against the covenant he shall corrupt with flattery; BUT THE PEOPLE WHO KNOW THEIR GOD SHALL BE STRONG, AND CARRY OUT GREAT EXPLOITS." Daniel 11:32 (NKJV) • Those who know…steveezekiel (52)in hive-196037 • 9 months agoBEING STRONG TO DO EXPLOITS"THOSE who do wickedly against the covenant he shall corrupt with flattery; BUT THE PEOPLE WHO KNOW THEIR GOD SHALL BE STRONG, AND CARRY OUT GREAT EXPLOITS." Daniel 11:32 (NKJV) • Those who know…steveezekiel (52)in strength • 9 months agoBEING STRONG TO DO EXPLOITS"THOSE who do wickedly against the covenant he shall corrupt with flattery; BUT THE PEOPLE WHO KNOW THEIR GOD SHALL BE STRONG, AND CARRY OUT GREAT EXPLOITS." Daniel 11:32 (NKJV) • Those who know…sadcorp (51)in twitter • 3 years agoJack Dorsey + Day 0 = Zero day exploits?"Jack Dorsey just tweeted out "Day 0" today. What the hell is THAT supposed to mean? Zero day?" "In August 2016, a group calling itself Shadow Brokers released a cache of top secret cyber spying…secpoint (49)in secpoint • 4 years agoSecPoint Protector Block Exploits & MalwareSecPoint Protector Block Exploits & Malware #secpoint #secpointprotector #malware #exploits #cybersecthekevinblog (5)in hive-116221 • 4 years agoExploits and Flash Loans Are Just the Beginning, Defi Economy Is Less Private Than People Think | Technology Bitcoin NewsDecentralized finance otherwise known as defi has climbed significantly in value this year, as the total value locked (TVL) in defi today is over $14 billion. Meanwhile, numerous defi platforms are…doifeellucky (64)in poc • 5 years agovia threatpost.com: PoC Exploits Do More Good Than Harm: Threatpost Poll; Interesting!!!!!IMG SRC Wow! A few days ago I posted this article here about the question if PoC Exploits should be made public or not including link to the article from threatpost.com with their…orch (32)in offsec • 5 years agoMalngin: A powerful anonymous curated acquisition and monetization platform for exploits and OffSec capabilitiesA new anonymous platform for security researchers, cryptanalysts and strategic investors is making some news of late. Malngin is offering up to US$10million in bounty rewards/one-time payouts to…edaze (49)in lightsail • 5 years agoLightSail 2: the probe that exploits the Sun sent a messageLightSail 2 is a concept that promises a lot in the field of interplanetary navigation: it does not actually use a traditional fuel, but rather the Sun to move within the Solar System saving weight…twr (53)in apiexploit • 5 years agoZipato Smart Home Hub Exploits Discovered That Could Allow An Attacker to Open iOT Door LocksSmart home solutions may seem to provide convenient security compared to conventional home security (door locks). Nonetheless, these IoT solutions can be vulnerable to cyber attacks. Recently…twr (53)in apiexploit • 6 years agoCUJO Firewall Vulnerabilities ExposedTwo separate vulnerabilities ran the risk of compromising the security of devices developed by Cujo AI. The smart hardware, Cujo Firewall, protects personal devices from online threats. The firewall…cosmicboy123 (55)in spanish • 7 years agoHardenedBSD otro sistema basado en FreeBSD con características interesantes.Introducción Fundado en 2014 por Oliver Pinter y Shawn Webb, HardenedBSD es un fork o trabajo derivado de FreeBSD enfocado en mejoras de seguridad. El proyecto HardenedBSD esta implementando…jaysermendez (63)in slothicorn • 7 years ago[Report] slothicorn.com - Vulnerability for a DDos attackAfter reviewing the Slothicorn website I noticed that this website is based in Wordpress. Hence, I've decided to quickly test this Wordpress installation in order to find security flaws. Here is…archvaldor (25)in warcraft • 7 years agoArchvaldor's Warcraft Hacks On DtubeArchvaldor's Warcraft Hacks now on Dtube. ▶️ DTube ▶️ IPFSsatablank (25)in hideandseek • 7 years ago"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots"But a new strain of malware, dubbed "Hide n Seek," can live through a power-cycle: it writes a copy of itself to the /etc/init.d/ directory in the IoT device's embedded GNU/Linux system, where…dwinblood (73)in news • 7 years agoAttempted Product Assassination? - AMD Ryzen Security Flaws - Though the shady part is in how they were disclosed to AMD.A mysterious lab based out of Israel named CTS-Labs notified AMD of five potential flaws in the Ryzen product line 24 hours before it was disclosed. This is typically done 90 days to give the…xasmae (25)in travel • 7 years agoThe city of Asilah Morocco between art and historyThe city of Asilah or; A Moroccan city located on the Atlantic coast. Over the past three decades, the city has undergone significant transformations in infrastructure, public utilities and urban…xasmae (25)in travel • 7 years agoThe Red MarrakechMarrakech is also called the Red City and the capital city of Marrakech, the third largest city in the Kingdom of Morocco in terms of population density and located in the south-center. The…rngdz (53)in technology • 7 years agoCaution Windows Users, NSA exploits can be used on all versions of Windows 2000 and upSo it has come to light that many of the exploits released, have been ported to all Windows versions. A security researcher has ported three leaked NSA exploits to work on all Windows versions…