bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

256
active users

#exploiting

0 posts0 participants0 posts today
PrivacyDigest<p>Threat posed by new <a href="https://mas.to/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> <a href="https://mas.to/tags/hyperjacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hyperjacking</span></a> <a href="https://mas.to/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> is hard to overstate</p><p>3 critical vulnerabilities in multiple <a href="https://mas.to/tags/VM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VM</span></a> products from VMware can give hackers unusually broad access to some of the most sensitive environments inside multiple customers’ networks, the company warned Tuesday.<br> <br>The class of <a href="https://mas.to/tags/attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attack</span></a> made possible by <a href="https://mas.to/tags/exploiting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploiting</span></a> the vulnerabilities is known under several names, including hyperjacking, hypervisor attack, or virtual machine escape.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> </p><p><a href="https://arstechnica.com/security/2025/03/vmware-patches-3-critical-vulnerabilities-in-multiple-product-lines/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/vmware-patches-3-critical-vulnerabilities-in-multiple-product-lines/</span></a></p>
PrivacyDigest<p>China’s <a href="https://mas.to/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://mas.to/tags/Spies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spies</span></a> Are Still <a href="https://mas.to/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> Telecoms—Now by <a href="https://mas.to/tags/Exploiting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploiting</span></a> <a href="https://mas.to/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://mas.to/tags/Routers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Routers</span></a> </p><p>Despite high-profile attention and even US sanctions, the group hasn’t stopped or even slowed its operation, including the <a href="https://mas.to/tags/breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>breach</span></a> of two more US <a href="https://mas.to/tags/telecoms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telecoms</span></a>.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/telecom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telecom</span></a></p><p><a href="https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/chinas-salt-ty</span><span class="invisible">phoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a> are <a href="https://mas.to/tags/exploiting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploiting</span></a> a new <a href="https://mas.to/tags/Ivanti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ivanti</span></a> <a href="https://mas.to/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> bug to <a href="https://mas.to/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> into company networks | TechCrunch </p><p>US software giant Ivanti has warned that a zero-day <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> in its widely-used enterprise VPN appliance has been <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploited</span></a> to compromise the networks of its corporate customers.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mas.to/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a></p><p><a href="https://techcrunch.com/2025/01/09/hackers-are-exploiting-a-new-ivanti-vpn-security-bug-to-hack-into-company-networks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/01/09/hack</span><span class="invisible">ers-are-exploiting-a-new-ivanti-vpn-security-bug-to-hack-into-company-networks/</span></a></p>
PrivacyDigest<p>Chinese <a href="https://mas.to/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> singlehandedly responsible for <a href="https://mas.to/tags/exploiting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploiting</span></a> 81,000 <a href="https://mas.to/tags/Sophos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sophos</span></a> <a href="https://mas.to/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> , <a href="https://mas.to/tags/DOJ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOJ</span></a> says | Cybernews <br><a href="https://mas.to/tags/china" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>china</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://cybernews.com/security/doj-indicts-ofac-sanctions-chinese-hacker-exploits-sophos-firewalls-/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybernews.com/security/doj-ind</span><span class="invisible">icts-ofac-sanctions-chinese-hacker-exploits-sophos-firewalls-/</span></a></p>
:radare2: radare :verified:<p>❄️Ready for the Advent of Radare? ❄️<br>--&gt; <a href="https://radare.org/advent" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">radare.org/advent</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/aor24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aor24</span></a><br>Starting tomorrow, December 1st we will release every day a new article with general knowledge, tricks, scripts and challenges to solve with radare2 covering topics from <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/firmwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmwareanalysis</span></a> <a href="https://infosec.exchange/tags/debugging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debugging</span></a> <a href="https://infosec.exchange/tags/exploiting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploiting</span></a> <a href="https://infosec.exchange/tags/binaryanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>binaryanalysis</span></a> <a href="https://infosec.exchange/tags/lowlevel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lowlevel</span></a> <a href="https://infosec.exchange/tags/assembly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assembly</span></a></p>