New: vulnerabilityAll contenthive-129948krhive-196917zzansteemhive-183959hive-166405photographyhive-180932hive-185836uncommonlabhive-183397hive-150122hive-101145hive-144064hive-188619bitcoinhive-145157krsuccesshive-193637lifehive-184714hive-181136hive-109690hive-103599TrendingNewHotLikerszumed (80)in life • 2 days agoVulnerability and courage: Reaching out is a strengthHave you ever found yourself sitting at a family gathering or another social event, only to be greeted with the common question, "How are you?" This question, though often asked with genuine…mrosenquist (70)in cybersecurity • 2 months agoPerfect Vulnerability for CISO Ultra Reliable SystemsA “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is…blockchainhorror (73)in blockchain • 4 months agoForbes - North Korean hackers exploited a vulnerability in Google Chrome to steal cryptocurrency from usersNorth Korean hackers have exploited a vulnerability in Google Chrome to steal cryptocurrency from users. The hackers used a trojan malware called AppleJeus to gather information and gain control…blockchainhorror (73)in blockchain • 4 months agoNewsBytes - A North Korean hacking group exploited a vulnerability in Chrome-based browsers to target cryptocurrency organizationsA North Korean hacking group, Citrine Sleet, exploited a zero-day vulnerability in Chrome-based browsers to target cryptocurrency organizations. Microsoft has warned users to be vigilant against…sysuperior (44)in palestinian-israeli • 4 months ago글로벌 뉴스2024.08.14팔레스타인 남자가 울고 있다 Microsoft는 Windows 시스템에 CVE-2024-38063이라는 심각한 보안 취약점이 노출되었음을 공식적으로 밝혔습니다. 이 취약점은 지원되는 모든 Windows 버전에 영향을 미칩니다. 이 취약점의 CVSS3.1 점수는 "중요"입니다. 공격자는 특별히 제작된 IPv6 패킷을 통해 원격으로 장치에 침입하여…secpoint (49)in regresshion • 6 months agoProtect your systems! Scan for the critical OpenSSH vulnerability CVE-2024-6387 (regreSSHion) and the older flaws CVE-2006-5051 and CVE-2008-4109. Use the SecPoint Penetrator V60 to detect and fix these security risks effectively. Stay secure!Protect your systems! Scan for the critical OpenSSH vulnerability CVE-2024-6387 (regreSSHion) and the older flaws CVE-2006-5051 and CVE-2008-4109. Use the SecPoint Penetrator V60 to detect and fix…nooses (78)in patriarchy • 7 months agoPatriarchy has made life harder for men in a lot of ways.One of the worst is socializing women (and other men) to respond to male vulnerability with disgust. It's not always contextualized as "men don't cry," either; I often see that knee-jerk disgust…blockchainhorror (73)in blockchain • 8 months agoCointelegraph - Hackers exploited a vulnerability to steal $181,000 worth of crypto from defunct DeFi platform Yield Protocol, despite warnings to users and the platform's shutdownHackers stole $181,000 worth of crypto from defunct DeFi platform Yield Protocol despite prior warnings to users. The attackers exploited a vulnerability in Yield's smart contracts. This…toaljony (34)in security • 9 months agoSecurity And Vulnerability Management Market Key Players, Trends, Share, Size, GrowthThe global Security And Vulnerability Management Market size is projected to grow from USD 13.8 billion in 2021 to USD 18.7 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 6.3% during…ferhatgs55 (26)in hive-172186 • 9 months agoSqlmap Vulnerability ScanningSQLMap: Automated SQL Injection and Database Takeover Tool SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…ferhatgs55 (26)in hive-172186 • 9 months agoSqlmap Vulnerability ScanningSQLMap: Automated SQL Injection and Database Takeover Tool SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…viralsmile07 (7)in humanity • 10 months agoThe Unexpected Benefits of Embracing VulnerabilityIn a society that often celebrates strength and resilience, vulnerability is frequently viewed as a weakness. However, recent research and personal anecdotes are shedding light on the unexpected…xiaozhi666 (33)in vulnerability • last yearAchilles' Heel: The Emblem of VulnerabilityAchilles' heel originates from Greek mythology, representing a focal point of vulnerability, even in the most formidable individuals or systems. According to the myth, Achilles' mother dipped him in…xiaozhi666 (33)in achillesheel • last yearAchilles' Heel: An Emblem of VulnerabilityAchilles' heel originates from Greek mythology, notably the tale of the hero Achilles, who was invulnerable save for his heel. This term has transcended its mythic roots to become a metaphor for a…lawns (80)in motivation • last yearsteemCreated with Sketch.How does vulnerability strengthen relationships?There are several misconceptions regarding vulnerability. When we express how we feel, we do it in the hopes that others would comprehend and empathise with us. In point of fact, expressing your…pomeline (79)in mission • last yearFunny how a little thing like vulnerability makes him more relatable.One thing that's made the Mission: Impossible franchise so much better since Ghost Protocol is the choice to show Ethan Hunt being genuinely afraid before some of the bigger stunts. It's played…elviosmar78 (25)in masculinity • last yearNavigating Vulnerability: When Men Struggle to Share Failures with Their PartnersLife is a journey paved with triumphs and setbacks, and yet, when the road takes an unexpected turn towards failure, it's not uncommon for men to find themselves grappling with a unique challenge -…divia (79)in life • last yearsteemCreated with Sketch.Openness and Authenticity Improve Relationships By AcceptingHave you ever noticed how the people closest to you are always super real and open? People usually like hanging out with you, which makes sense. It's totally normal to be careful about showing…suzicasamo (33)in vulnerability • 2 years agosteemCreated with Sketch.The Power of Vulnerability: How Embracing Your Imperfections Can Transform Your LifeIn a world that often promotes perfection and masks vulnerability, it's important to recognize the transformative power of embracing our imperfections. We live in a society that values strength…figbear (29)in vulnerability • 2 years agoAndroid Security: Cryptocurrency Mining-Malware Hidden in VPNs, Games, and Streaming Apps, Downloaded 100,000 TimesCybercriminals who are passionate about using cryptocurrency to thrive are increasingly attempting to use vulnerability mining malware to infect mobile devices, and they even use the official…