Forwarded from NoGoolag
A Look Inside #FUTO #Keyboard's #Swipe Feature
https://peertube.futo.org/videos/watch/d4d3d059-a45b-419a-876d-f2b051540a45
https://peertube.futo.org/videos/watch/d4d3d059-a45b-419a-876d-f2b051540a45
FUTO PeerTube Instance
A Look Inside FUTO Keyboard's Swipe Feature
PeerTube, an ActivityPub-federated video streaming platform using P2P directly in your web browser.
Forwarded from The Hacker News
🔥 Critical Security Alert! Ivanti uncovers a CVSS 10.0-rated vulnerability allowing unauthenticated attackers to gain admin access in their Cloud Services Application.
This flaw isn’t alone—Ivanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
🔗 Don't wait—explore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
This flaw isn’t alone—Ivanti has patched multiple critical vulnerabilities in its Connect Secure and CSA products.
🔗 Don't wait—explore the critical details and ensure your systems are secure: https://thehackernews.com/2024/12/ivanti-issues-critical-security-updates.html
Forwarded from The Hacker News
U.S. has unsealed charges against a Chinese hacker for exploiting a zero-day #vulnerability in 81,000 Sophos firewalls, enabling the infiltration of critical systems, the theft of sensitive data, and targeting U.S. infrastructure.
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
Forwarded from The Hacker News
💻 Microsoft’s final Patch Tuesday of 2024 fixed 72 vulnerabilities, including one actively exploited in the wild: CVE-2024-49138.
Ensure your systems are updated now.
đź”— Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
Ensure your systems are updated now.
đź”— Read more: https://thehackernews.com/2024/12/microsoft-fixes-72-flaws-including.html
Forwarded from The Hacker News
Discover how Zero Trust, immutable backups, and encryption can secure Microsoft365—starting with Zero Trust, where every access request is verified.
Learn key strategies to protect your environment.
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
Learn key strategies to protect your environment.
Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
Forwarded from The Hacker News
🚨 A new surveillance tool, EagleMsgSpy, has been exposed as a powerful spyware linked to Chinese police departments, secretly collecting vast data from mobile devices since 2017.
đź”— Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
đź”— Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
Forwarded from The Hacker News
🔒 ZLoader #malware is back—with a stealthy upgrade. The latest version employs DNS tunneling for encrypted communication, raising the stakes for detection efforts.
This isn’t just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
This isn’t just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
Forwarded from The Hacker News
🚨 A security flaw, dubbed AuthQuake, in Microsoft’s Multi-Factor Authentication (MFA) allowed attackers to bypass protection within an hour – no alerts, no interaction required.
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
Forwarded from Tech Leaks/News Chat (PowerVR Founder)
Home - Servify - Reimagining Device Ownership Experiences
https://global.servify.tech/
https://global.servify.tech/
Servify - Your Personal Device Assistant
Home - Servify - Reimagining Device Ownership Experiences
Servify offers the world's most advanced self-learning post-purchase service platform to deliver great customer experience. Integrating multiple partners of the post sales service ecosystem on a tech-driven unified intelligent platform, Servify provides Device…
Forwarded from It's FOSS
Top 4 On-Prem Infrastructure Monitoring Solutions to Try
https://linuxhandbook.com/on-prem-infrastructure-monitoring/
https://linuxhandbook.com/on-prem-infrastructure-monitoring/
Linux Handbook
4 On Prem Infrastructure Monitoring Solutions You Should Try
Looking for on-premise infrastructure monitoring solution recommendations? Here are a few suggestions you can give a try.
Forwarded from It's FOSS
Good deal for Linux and DevOps career aspirants
Linux Foundation is offering 60% discount on their CKA, LFCS and other certification exams
CKA costs $395, now it is only $198 🤑
Hurry up! Only a few hours left⌛️
https://tidd.ly/3AYvan8
Linux Foundation is offering 60% discount on their CKA, LFCS and other certification exams
CKA costs $395, now it is only $198 🤑
Hurry up! Only a few hours left⌛️
https://tidd.ly/3AYvan8
Linux Foundation - Education
Promo Inactive - Linux Foundation - Education
Sign up for our newsletter to get updates on our latest promotions.
Forwarded from It's FOSS
Using Windows sucks, but these apps make it bearable. 👇 🤌
https://itsfoss.com/open-source-tools-windows/
https://itsfoss.com/open-source-tools-windows/
It's FOSS
5 Open-Source Tools That are Available on Windows, not Linux
Not your usual list, but these are useful open-source apps for Windows users.
Forwarded from The Hacker News
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 A trusted Windows feature, UI Automation, can be exploited by #malware to bypass EDR detection, execute stealthy commands, and steal data undetected.
đź”— Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
đź”— Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
Forwarded from Treble GSI's | Privacy + Secure
■□□□□ Large language models can be squeezed onto your phone — rather than needing 1000s of servers to run — using compression.
https://www.livescience.com/technology/artificial-intelligence/large-language-models-can-be-squeezed-onto-your-phone-rather-than-needing-1000s-of-servers-to-run-after-breakthrough
https://www.livescience.com/technology/artificial-intelligence/large-language-models-can-be-squeezed-onto-your-phone-rather-than-needing-1000s-of-servers-to-run-after-breakthrough
livescience.com
Large language models can be squeezed onto your phone — rather than needing 1000s of servers to run — after breakthrough
Running massive AI models locally on smartphones or laptops may be possible after a new compression algorithm trims down their size — meaning your data never leaves your device. The catch is that it might drain your battery in an hour.
Forwarded from Treble GSI's | Privacy + Secure
■■■□□ Kaspersky's GReAT has released private plugin – the hrtng plugin for IDA Pro, the result of nearly 10 years of work. Packed with 37 advanced features, the plugin includes entirely new capabilities along with powerful upgrades to popular third-party plugins.
Each feature comes with detailed descriptions, demo links, and practical examples, all designed to make malware analysis faster, more effective, and more efficient.
An example of usage hrtng plugin to dissect FinSpy spyware is here
Each feature comes with detailed descriptions, demo links, and practical examples, all designed to make malware analysis faster, more effective, and more efficient.
An example of usage hrtng plugin to dissect FinSpy spyware is here
GitHub
GitHub - KasperskyLab/hrtng: IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition…
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations - KasperskyLab/hrtng
Forwarded from Hacker News
Combinatorics and more
The Case Against Google’s Claims of “Quantum Supremacy”: A Very Short Introduction.
The 2019 paper “Quantum supremacy using a programmable superconducting processor” asserted that Google’s Sycamore quantum computer, with 53 qubits and a depth of 20, performed a specific computat…
Forwarded from Hacker News
Red Hat Developer
Making memcpy(NULL, NULL, 0) well-defined | Red Hat Developer
Undefined behavior (UB) in the C programming language is a regular source of heated discussions among programmers. On the one hand, UB can be important for compiler optimizations. On the other hand
Forwarded from Hacker News
Terence Eden’s Blog
Is WordPress.org GDPR compliant?
A few weeks ago, I got a chance to speak truth to power. I used my WordPress.org account to sign in to the official WordPress.org Slack where the various WordPress dramas were being discussed. After a brief chat about the latest shenanigans, I publicly replied…