New: vulnerabilityAll contenthive-129948hive-196917krzzanhive-183959hive-166405steemhive-180932photographyhive-185836uncommonlabhive-144064bitcoinhive-150122hive-183397krsuccesshive-188619lifehive-101145hive-139150hive-145157hive-109690hive-124908hive-103599hive-181136TrendingNewHotLikersblockchainhorror (73)in blockchain • 2 months agoForbes - North Korean hackers exploited a vulnerability in Google Chrome to steal cryptocurrency from usersNorth Korean hackers have exploited a vulnerability in Google Chrome to steal cryptocurrency from users. The hackers used a trojan malware called AppleJeus to gather information and gain control…blockchainhorror (73)in blockchain • 2 months agoNewsBytes - A North Korean hacking group exploited a vulnerability in Chrome-based browsers to target cryptocurrency organizationsA North Korean hacking group, Citrine Sleet, exploited a zero-day vulnerability in Chrome-based browsers to target cryptocurrency organizations. Microsoft has warned users to be vigilant against…sysuperior (44)in palestinian-israeli • 3 months ago글로벌 뉴스2024.08.14팔레스타인 남자가 울고 있다 Microsoft는 Windows 시스템에 CVE-2024-38063이라는 심각한 보안 취약점이 노출되었음을 공식적으로 밝혔습니다. 이 취약점은 지원되는 모든 Windows 버전에 영향을 미칩니다. 이 취약점의 CVSS3.1 점수는 "중요"입니다. 공격자는 특별히 제작된 IPv6 패킷을 통해 원격으로 장치에 침입하여…secpoint (49)in regresshion • 4 months agoProtect your systems! Scan for the critical OpenSSH vulnerability CVE-2024-6387 (regreSSHion) and the older flaws CVE-2006-5051 and CVE-2008-4109. Use the SecPoint Penetrator V60 to detect and fix these security risks effectively. Stay secure!Protect your systems! Scan for the critical OpenSSH vulnerability CVE-2024-6387 (regreSSHion) and the older flaws CVE-2006-5051 and CVE-2008-4109. Use the SecPoint Penetrator V60 to detect and fix…nooses (78)in patriarchy • 5 months agoPatriarchy has made life harder for men in a lot of ways.One of the worst is socializing women (and other men) to respond to male vulnerability with disgust. It's not always contextualized as "men don't cry," either; I often see that knee-jerk disgust…blockchainhorror (73)in blockchain • 6 months agoCointelegraph - Hackers exploited a vulnerability to steal $181,000 worth of crypto from defunct DeFi platform Yield Protocol, despite warnings to users and the platform's shutdownHackers stole $181,000 worth of crypto from defunct DeFi platform Yield Protocol despite prior warnings to users. The attackers exploited a vulnerability in Yield's smart contracts. This…toaljony (34)in security • 7 months agoSecurity And Vulnerability Management Market Key Players, Trends, Share, Size, GrowthThe global Security And Vulnerability Management Market size is projected to grow from USD 13.8 billion in 2021 to USD 18.7 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 6.3% during…ferhatgs55 (26)in hive-172186 • 7 months agoSqlmap Vulnerability ScanningSQLMap: Automated SQL Injection and Database Takeover Tool SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…ferhatgs55 (26)in hive-172186 • 7 months agoSqlmap Vulnerability ScanningSQLMap: Automated SQL Injection and Database Takeover Tool SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…viralsmile07 (7)in humanity • 8 months agoThe Unexpected Benefits of Embracing VulnerabilityIn a society that often celebrates strength and resilience, vulnerability is frequently viewed as a weakness. However, recent research and personal anecdotes are shedding light on the unexpected…xiaozhi666 (33)in vulnerability • last yearAchilles' Heel: The Emblem of VulnerabilityAchilles' heel originates from Greek mythology, representing a focal point of vulnerability, even in the most formidable individuals or systems. According to the myth, Achilles' mother dipped him in…xiaozhi666 (33)in achillesheel • last yearAchilles' Heel: An Emblem of VulnerabilityAchilles' heel originates from Greek mythology, notably the tale of the hero Achilles, who was invulnerable save for his heel. This term has transcended its mythic roots to become a metaphor for a…lawns (80)in motivation • last yearsteemCreated with Sketch.How does vulnerability strengthen relationships?There are several misconceptions regarding vulnerability. When we express how we feel, we do it in the hopes that others would comprehend and empathise with us. In point of fact, expressing your…pomeline (79)in mission • last yearFunny how a little thing like vulnerability makes him more relatable.One thing that's made the Mission: Impossible franchise so much better since Ghost Protocol is the choice to show Ethan Hunt being genuinely afraid before some of the bigger stunts. It's played…elviosmar78 (25)in masculinity • last yearNavigating Vulnerability: When Men Struggle to Share Failures with Their PartnersLife is a journey paved with triumphs and setbacks, and yet, when the road takes an unexpected turn towards failure, it's not uncommon for men to find themselves grappling with a unique challenge -…divia (79)in life • last yearsteemCreated with Sketch.Openness and Authenticity Improve Relationships By AcceptingHave you ever noticed how the people closest to you are always super real and open? People usually like hanging out with you, which makes sense. It's totally normal to be careful about showing…suzicasamo (33)in vulnerability • last yearsteemCreated with Sketch.The Power of Vulnerability: How Embracing Your Imperfections Can Transform Your LifeIn a world that often promotes perfection and masks vulnerability, it's important to recognize the transformative power of embracing our imperfections. We live in a society that values strength…figbear (29)in vulnerability • last yearAndroid Security: Cryptocurrency Mining-Malware Hidden in VPNs, Games, and Streaming Apps, Downloaded 100,000 TimesCybercriminals who are passionate about using cryptocurrency to thrive are increasingly attempting to use vulnerability mining malware to infect mobile devices, and they even use the official…blockchainhorror (73)in blockchain • 2 years agoCoinTelegraph - Blockchain isn’t as decentralized as you think: Defense agency reportAmong the key findings is that the following can provide room for centralization: old bitcoin nodes, unencrypted mining pools, and unencrypted network traffic that passes through only a…tambi (80)in life • 2 years agoManaging emotions and emotional vulnerabilitySimply because you are emotionally vulnerable does not mean that you are required to always share your feelings. It indicates that you don't try to mask your true emotions in front of other people…