New: vulnerabilityAll contenthive-129948hive-196917krhive-166405hive-150122hive-180932zzansteemhive-185836hive-188619hive-144064hive-101145hive-183959hive-183397uncommonlabphotographyhive-139150hive-103599hive-145157hive-180301hive-170554hive-109690photolifebitcoinTrendingNewHotLikersmichaellamin (33)in mentalhealth • 2 months agosteemCreated with Sketch.How to Start Living AuthenticallyYou’re not too much. You’re just not meant to be less. We spend years trying to fit in. Shrinking ourselves into what’s acceptable. Twisting our voices, softening our edges, laughing at things…mrosenquist (70)in cybersecurity • 3 months agoLast Minute Save for the CVE ProgramI am very glad that the Common Vulnerabilities and Exposures (CVE) program was re-funded by the US Government, specifically CISA (Cybersecurity and Infrastructure Security Agency), but this…hmmiu (33)in vulnerability • 3 months agoTips to Choose the Right Vulnerability Scanning Service for Your BusinessTips to Choose the Right Vulnerability Scanning Service for Your Business Selecting a vulnerability scanning service is a critical decision that can significantly impact your organization's…hacxx (37)in hacxx • 4 months agoHacxx Vulnerability Scanner - Comprehensive Website Security Testing at TekCitiesHacxx Vulnerability Scanner is an advanced tool designed to identify security flaws in websites. Scan for exposed paths, missing headers, CORS misconfigurations, and other vulnerabilities to…mrosenquist (70)in cybersecurity • 4 months agoAre They Vulnerabilities or Undocumented Debug FeaturesThe recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices and could represent a cybersecurity risk. Its reveal by…mrosenquist (70)in cybersecurity • 6 months agoCybersecurity Misuse vs Technical VulnerabilityOne of my 2025 cybersecurity predictions is we will see more victimization through the use of products and services which don’t have a technical vulnerability, but rather design features which can…zumed (80)in life • 6 months agoVulnerability and courage: Reaching out is a strengthHave you ever found yourself sitting at a family gathering or another social event, only to be greeted with the common question, "How are you?" This question, though often asked with genuine…mrosenquist (70)in cybersecurity • 8 months agoPerfect Vulnerability for CISO Ultra Reliable SystemsA “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is…blockchainhorror (73)in blockchain • 10 months agoForbes - North Korean hackers exploited a vulnerability in Google Chrome to steal cryptocurrency from usersNorth Korean hackers have exploited a vulnerability in Google Chrome to steal cryptocurrency from users. The hackers used a trojan malware called AppleJeus to gather information and gain control…blockchainhorror (73)in blockchain • 10 months agoNewsBytes - A North Korean hacking group exploited a vulnerability in Chrome-based browsers to target cryptocurrency organizationsA North Korean hacking group, Citrine Sleet, exploited a zero-day vulnerability in Chrome-based browsers to target cryptocurrency organizations. Microsoft has warned users to be vigilant against…sysuperior (44)in palestinian-israeli • 11 months ago글로벌 뉴스2024.08.14팔레스타인 남자가 울고 있다 Microsoft는 Windows 시스템에 CVE-2024-38063이라는 심각한 보안 취약점이 노출되었음을 공식적으로 밝혔습니다. 이 취약점은 지원되는 모든 Windows 버전에 영향을 미칩니다. 이 취약점의 CVSS3.1 점수는 "중요"입니다. 공격자는 특별히 제작된 IPv6 패킷을 통해 원격으로 장치에 침입하여…secpoint (49)in regresshion • last yearProtect your systems! Scan for the critical OpenSSH vulnerability CVE-2024-6387 (regreSSHion) and the older flaws CVE-2006-5051 and CVE-2008-4109. Use the SecPoint Penetrator V60 to detect and fix these security risks effectively. Stay secure!Protect your systems! Scan for the critical OpenSSH vulnerability CVE-2024-6387 (regreSSHion) and the older flaws CVE-2006-5051 and CVE-2008-4109. Use the SecPoint Penetrator V60 to detect and fix…nooses (78)in patriarchy • last yearPatriarchy has made life harder for men in a lot of ways.One of the worst is socializing women (and other men) to respond to male vulnerability with disgust. It's not always contextualized as "men don't cry," either; I often see that knee-jerk disgust…blockchainhorror (73)in blockchain • last yearCointelegraph - Hackers exploited a vulnerability to steal $181,000 worth of crypto from defunct DeFi platform Yield Protocol, despite warnings to users and the platform's shutdownHackers stole $181,000 worth of crypto from defunct DeFi platform Yield Protocol despite prior warnings to users. The attackers exploited a vulnerability in Yield's smart contracts. This…toaljony (34)in security • last yearSecurity And Vulnerability Management Market Key Players, Trends, Share, Size, GrowthThe global Security And Vulnerability Management Market size is projected to grow from USD 13.8 billion in 2021 to USD 18.7 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 6.3% during…ferhatgs55 (26)in hive-172186 • last yearSqlmap Vulnerability ScanningSQLMap: Automated SQL Injection and Database Takeover Tool SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…ferhatgs55 (26)in hive-172186 • last yearSqlmap Vulnerability ScanningSQLMap: Automated SQL Injection and Database Takeover Tool SQLMap is a powerful open-source penetration testing tool that automates the process of detecting and exploiting SQL injection…viralsmile07 (7)in humanity • last yearThe Unexpected Benefits of Embracing VulnerabilityIn a society that often celebrates strength and resilience, vulnerability is frequently viewed as a weakness. However, recent research and personal anecdotes are shedding light on the unexpected…xiaozhi666 (33)in vulnerability • 2 years agoAchilles' Heel: The Emblem of VulnerabilityAchilles' heel originates from Greek mythology, representing a focal point of vulnerability, even in the most formidable individuals or systems. According to the myth, Achilles' mother dipped him in…xiaozhi666 (33)in achillesheel • 2 years agoAchilles' Heel: An Emblem of VulnerabilityAchilles' heel originates from Greek mythology, notably the tale of the hero Achilles, who was invulnerable save for his heel. This term has transcended its mythic roots to become a metaphor for a…