Vulnerabilities

More like bye-bye, bit.

5 Likes

Big party at Kim Jong Un’s tonight…

9 Likes
7 Likes

So, US contractors are not allowed to use Kasperskiy Labs for anything for this very reason.

It never fails to shock someone during my trainings. :thinking:

8 Likes
12 Likes

Stuff a Pi-hole in your router because your browser is about to betray you

6 Likes
4 Likes

Yeah, getting rid of the pen-testing people shouldn’t have any consequences, right?

5 Likes

(Hope I’m putting this in the right thread)

9 Likes

DOGE vs. NIST:

7 Likes
10 Likes

https://cybernews.com/security/half-login-attempts-use-compromised-password/

5 Likes

One thing that isn’t noted in these articles is that on an https site, your password is not passed in plaintext, if they are able to understand that half of these passwords are compromised, it means they are sitting in the middle, able to log all of those passwords. :confused:

3 Likes

Here’s what military planning usually looks like — and why it doesn’t include Signal

5 Likes

11 Likes

8 Likes
6 Likes
5 Likes

(No one uses IIS these days.)

Heh… heh… yeah, I mean, who would be so out of it to not even know that? Right? I mean can you imagine how they’d react when you explain to them why that is the case? I mean if you told them right now?Heh-heh…

2 Likes

From another article on the same site:

Adobe released 50-plus fixes this month […] Adobe ranked the bugs it fixed in Cold Fusion as both critical and important, and urged users to make them their top priority

Personally, I would’ve thought that if someone out there is using Coldfusion, then fixing their time machine and getting back to 1995 should be their top priority. But hey, good to know they’re still releasing security fixes at least.

5 Likes