mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#exploit

6 posts6 participants0 posts today
packet storm<p>Meshtastic Buffer Overflow <a href="https://packetstorm.news/files/190552" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190552</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
heise Security<p>Sonicwall SMA100: Angreifer missbrauchen alte Sicherheitslücke</p><p>Derzeit finden Angriffe auf alte Sicherheitslücken in Sonicwalls Firmware für Geräte der SMA100-Baureihen statt. </p><p><a href="https://www.heise.de/news/Sonicwall-SMA100-Angreifer-missbrauchen-alte-Sicherheitsluecke-10355459.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sonicwall-SMA100</span><span class="invisible">-Angreifer-missbrauchen-alte-Sicherheitsluecke-10355459.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Dell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dell</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Alexandre Borges<p>A Warning about Malicious PoCs:</p><p><a href="https://chocapikk.com/posts/2025/s1nk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">chocapikk.com/posts/2025/s1nk/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
heise Security<p>14.000 Fortinet-Firewalls kompromitiert: Angreifer nisten sich ein</p><p>Mehr als 14.000 Fortinet-Firewalls sind derzeit von Angreifern kompromittiert. Die verankern sich mit Symlinks im System.</p><p><a href="https://www.heise.de/news/14-000-Fortinet-Firewalls-kompromitiert-Angreifer-nisten-sich-ein-10352344.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/14-000-Fortinet-</span><span class="invisible">Firewalls-kompromitiert-Angreifer-nisten-sich-ein-10352344.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Angriffe auf Sicherheitsleck in Wordpress-Plug-in SureTriggers laufen</p><p>Das Plug-in SureTriggers ist auf 100.000 Wordpress-Instanzen installiert. Kurze Zeit nach Bekanntwerden eines Sicherheitslecks laufen Angriffe.</p><p><a href="https://www.heise.de/news/Angriffe-auf-Sicherheitsleck-in-Wordpress-Plug-in-SureTriggers-laufen-10351224.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Angriffe-auf-Sic</span><span class="invisible">herheitsleck-in-Wordpress-Plug-in-SureTriggers-laufen-10351224.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Hacker News<p>One Bug Wasn't Enough: Escalating Twice Through SAP's Setuid Landscape</p><p><a href="https://www.anvilsecure.com/blog/one-bug-wasnt-enough-escalating-twice-through-saps-setuid-landscape.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">anvilsecure.com/blog/one-bug-w</span><span class="invisible">asnt-enough-escalating-twice-through-saps-setuid-landscape.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/OneBugWasntEnough" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OneBugWasntEnough</span></a> <a href="https://mastodon.social/tags/SAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAP</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Setuid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Setuid</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
Nathaniel Gregory<p>Truth be told, I just think this is part of a larger effort by <a href="https://mastodon.social/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> &amp; his buddies to cynically manipulate &amp; <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/markets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>markets</span></a> by arbitrarily rendering them volatile, as <a href="https://mastodon.social/tags/capitalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>capitalism</span></a> continues to eat itself in real time.</p><p><a href="https://mastodon.social/tags/Politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Politics</span></a> <a href="https://mastodon.social/tags/Democrats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democrats</span></a> <a href="https://mastodon.social/tags/Republicans" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Republicans</span></a> <a href="https://mastodon.social/tags/Liberals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Liberals</span></a> <a href="https://mastodon.social/tags/Conservatives" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Conservatives</span></a> <a href="https://mastodon.social/tags/Vote" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vote</span></a> <a href="https://mastodon.social/tags/Election" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Election</span></a> <a href="https://mastodon.social/tags/DemocraticParty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DemocraticParty</span></a> <a href="https://mastodon.social/tags/DNC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNC</span></a> <a href="https://mastodon.social/tags/RepublicanParty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RepublicanParty</span></a> <a href="https://mastodon.social/tags/RNC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RNC</span></a> <a href="https://mastodon.social/tags/GOP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GOP</span></a> <a href="https://mastodon.social/tags/DonaldTrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DonaldTrump</span></a> <a href="https://mastodon.social/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> <a href="https://mastodon.social/tags/JDVance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JDVance</span></a> <a href="https://mastodon.social/tags/Vance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vance</span></a> <a href="https://mastodon.social/tags/JoeBiden" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JoeBiden</span></a> <a href="https://mastodon.social/tags/Biden" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Biden</span></a> <a href="https://mastodon.social/tags/KamalaHarris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KamalaHarris</span></a> <a href="https://mastodon.social/tags/Harris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Harris</span></a> <a href="https://mastodon.social/tags/TimWalz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TimWalz</span></a> <a href="https://mastodon.social/tags/Walz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Walz</span></a> <a href="https://mastodon.social/tags/Democracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Democracy</span></a> <a href="https://mastodon.social/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <a href="https://mastodon.social/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> <a href="https://mastodon.social/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://mastodon.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://mastodon.social/tags/Fascism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fascism</span></a> <a href="https://mastodon.social/tags/Fascist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fascist</span></a></p>
heise Security<p>Patchday: Angreifer attackieren Windows und verschaffen sich System-Rechte</p><p>Microsoft hat über Windows Update wichtige Sicherheitspatches für unter anderem Azure, Bitlocker und Kerberos bereitgestellt. </p><p><a href="https://www.heise.de/news/Patchday-Angreifer-attackieren-Windows-und-verschaffen-sich-System-Rechte-10345516.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Patchday-Angreif</span><span class="invisible">er-attackieren-Windows-und-verschaffen-sich-System-Rechte-10345516.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
CEOTECH.IT<p>Google rilascia un update Android per 2 bug zero-day critici<br><a href="https://mastodon.social/tags/Aggiornamenti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Aggiornamenti</span></a> <a href="https://mastodon.social/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://mastodon.social/tags/AOSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AOSP</span></a> <a href="https://mastodon.social/tags/BugFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugFix</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://mastodon.social/tags/Notizie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Notizie</span></a> <a href="https://mastodon.social/tags/PatchDiSicurezza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchDiSicurezza</span></a> <a href="https://mastodon.social/tags/Sicurezza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicurezza</span></a> <a href="https://mastodon.social/tags/Smartphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smartphone</span></a> <a href="https://mastodon.social/tags/Tablet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tablet</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/Tecnologia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tecnologia</span></a> <a href="https://mastodon.social/tags/Update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Update</span></a> <a href="https://mastodon.social/tags/Vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilità</span></a> <a href="https://mastodon.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> </p><p><a href="https://www.ceotech.it/google-rilascia-un-update-android-per-2-bug-zero-day-critici/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ceotech.it/google-rilascia-un-</span><span class="invisible">update-android-per-2-bug-zero-day-critici/</span></a></p>
Eckes :mastodon:<p>That 10.0 is wildly missused. How would you Inject malformed parquet files without a priveledged position and unauthentication and how can you exploit a object constructor without skilled hunting for gadget chains - especially if no exploits in the wild. <a href="https://zusammenkunft.net/tags/cvss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cvss</span></a> <a href="https://zusammenkunft.net/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://zusammenkunft.net/tags/parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parquet</span></a> <a href="https://zusammenkunft.net/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://zusammenkunft.net/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> CVE-2025-30065</p>
Rod2ik 🇪🇺 🇨🇵 🇪🇸 🇺🇦 🇨🇦 🇩🇰 🇬🇱<p>« Un <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/spatial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spatial</span></a> <a href="https://mastodon.social/tags/historique" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>historique</span></a> » : <a href="https://mastodon.social/tags/Airbus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Airbus</span></a> réussit l’atterrissage du tout premier <a href="https://mastodon.social/tags/rover" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rover</span></a> <a href="https://mastodon.social/tags/europ%C3%A9en" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>européen</span></a> sur <a href="https://mastodon.social/tags/Mars" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mars</span></a>, une avancée géante pour l’ <a href="https://mastodon.social/tags/humanit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>humanité</span></a></p><p><a href="https://www.innovant.fr/2025/04/02/un-exploit-spatial-historique-airbus-reussit-latterrissage-du-tout-premier-rover-europeen-sur-mars-une-avancee-geante-pour-lhumanite/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">innovant.fr/2025/04/02/un-expl</span><span class="invisible">oit-spatial-historique-airbus-reussit-latterrissage-du-tout-premier-rover-europeen-sur-mars-une-avancee-geante-pour-lhumanite/</span></a></p>
heise Security<p>Apache Tomcat: Angriffe auf kritische Sicherheitslücke laufen</p><p>Eine kritische Sicherheitslücke in Apache Tomcat ermöglicht das Einschleusen von Schadcode. Genau das machen Angreifer derzeit.</p><p><a href="https://www.heise.de/news/Apache-Tomcat-Angriffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Apache-Tomcat-An</span><span class="invisible">griffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Angriffe auf Sicherheitsleck in CrushFTP beobachtet</p><p>Vergangene Woche wurde eine Sicherheitslücke in der Datentransfer-Software CrushFTP bekannt. IT-Forscher beobachten nun Angriffe darauf.</p><p><a href="https://www.heise.de/news/Angriffe-auf-Sicherheitsleck-in-CrushFTP-beobachtet-10336787.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Angriffe-auf-Sic</span><span class="invisible">herheitsleck-in-CrushFTP-beobachtet-10336787.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>CISA warnt vor Malware "Resurge" nach Ivanti-ICS-Attacken</p><p>Seit Anfang Januar sind Angriffe auf Ivantis ICS bekannt. Die CISA hat die Malware analysiert, die Angreifer installiert haben.</p><p><a href="https://www.heise.de/news/CISA-warnt-vor-Malware-Resurge-nach-Ivanti-ICS-Attacken-10333868.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CISA-warnt-vor-M</span><span class="invisible">alware-Resurge-nach-Ivanti-ICS-Attacken-10333868.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Blue DeviL // SCT<p>Blasting Past Webp - An analysis of the NSO BLASTPASS iMessage exploit</p><p>CC: Ian Beer</p><p><a href="https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">googleprojectzero.blogspot.com</span><span class="invisible">/2025/03/blasting-past-webp.html</span></a></p><p><a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/imessage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>imessage</span></a> <a href="https://infosec.exchange/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/zeroclick" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroclick</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p>An analysis of the NSO BLASTPASS <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/iMessage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iMessage</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> by Ian Beer, <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://infosec.exchange/tags/ProjectZero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProjectZero</span></a> <a href="https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">googleprojectzero.blogspot.com</span><span class="invisible">/2025/03/blasting-past-webp.html</span></a></p>
Hacker News<p>Blasting Past WebP - An analysis of the NSO BLASTPASS iMessage exploit</p><p><a href="https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">googleprojectzero.blogspot.com</span><span class="invisible">/2025/03/blasting-past-webp.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Blasting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blasting</span></a> <a href="https://mastodon.social/tags/Past" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Past</span></a> <a href="https://mastodon.social/tags/WebP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebP</span></a> <a href="https://mastodon.social/tags/An" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>An</span></a> <a href="https://mastodon.social/tags/analysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>analysis</span></a> <a href="https://mastodon.social/tags/of" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>of</span></a> <a href="https://mastodon.social/tags/the" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>the</span></a> <a href="https://mastodon.social/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a> <a href="https://mastodon.social/tags/BLASTPASS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BLASTPASS</span></a> <a href="https://mastodon.social/tags/iMessage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iMessage</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/analysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>analysis</span></a> <a href="https://mastodon.social/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a></p>
Blue DeviL // SCT<p>The Path Towards Automated Heap Exploitation</p><p>CC: Thaís Moreira Hamasaki</p><p><a href="https://www.youtube.com/watch?v=5XQ0cAwlWMo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=5XQ0cAwlWMo</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/heap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heap</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a></p>
Blue DeviL // SCT<p>Sophia D’Antoine - Practical Uses of Program Analysis: Automatic Exploit Generation</p><p><a href="https://www.youtube.com/watch?v=d3fy4se4JO0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=d3fy4se4JO0</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/analysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>analysis</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a></p>
Enrico "meldrian" Michaelis<p>Moin zusammen,</p><p>nutzt hier jemand <a href="https://social.tchncs.de/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.tchncs.de/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> als <a href="https://social.tchncs.de/tags/Browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browser</span></a>?</p><p>Update. <br>Jetzt.</p><p>Für Interessierte die es noch nicht auf dem Schirm haben: "CVE-2025-2783". <br>Viel Spaß beim nachblättern. </p><p>Für alle anderen gilt:<br>Update.<br>Jetzt.</p><p><a href="https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0641" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wid.cert-bund.de/portal/wid/se</span><span class="invisible">curityadvisory?name=WID-SEC-2025-0641</span></a></p><p>Viel Erfolg.</p><p><a href="https://social.tchncs.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.tchncs.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.tchncs.de/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleChrome</span></a> <a href="https://social.tchncs.de/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheit</span></a> <a href="https://social.tchncs.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p>