cyph3rPunkM · 8 months agoAirborne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Securityplus-squarewww.oligo.securityexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkAirborne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Securityplus-squarewww.oligo.securitycyph3rPunkM · 8 months agomessage-square0linkfedilink
cyph3rPunkM · 8 months agoThe Greatest Hack in History [26:08]plus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkThe Greatest Hack in History [26:08]plus-squareyoutu.becyph3rPunkM · 8 months agomessage-square0linkfedilink
cyph3rPunkM · 10 months agoMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govcyph3rPunkM · 10 months agomessage-square0linkfedilink
cyph3rPunkM · edit-211 months ago38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-link38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.becyph3rPunkM · edit-211 months agomessage-square0linkfedilink
cyph3rPunkM · edit-21 year agoDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netcyph3rPunkM · edit-21 year agomessage-square0linkfedilink
demesisxEnglish · 1 year agoFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.meexternal-linkmessage-square0linkfedilinkarrow-up127arrow-down12
arrow-up125arrow-down1external-linkFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.medemesisxEnglish · 1 year agomessage-square0linkfedilink
cyph3rPunkM · 1 year agoDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.beexternal-linkmessage-square1linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.becyph3rPunkM · 1 year agomessage-square1linkfedilink
adr1an@programming.dev · 1 year agoHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comexternal-linkmessage-square0linkfedilinkarrow-up138arrow-down11
arrow-up137arrow-down1external-linkHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comadr1an@programming.dev · 1 year agomessage-square0linkfedilink
demesisxEnglish · 1 year agohacker 'ghost' on githubplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkhacker 'ghost' on githubplus-squarewww.wired.comdemesisxEnglish · 1 year agomessage-square0linkfedilink
cyph3rPunkM · 1 year agonew vulnerability in your motherboardplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up125arrow-down11
arrow-up124arrow-down1external-linknew vulnerability in your motherboardplus-squareyoutu.becyph3rPunkM · 1 year agomessage-square0linkfedilink
cyph3rPunkM · 2 years agoXenoRAT | Malware of the Dayplus-squareyoutu.beexternal-linkmessage-square1linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkXenoRAT | Malware of the Dayplus-squareyoutu.becyph3rPunkM · 2 years agomessage-square1linkfedilink
cyph3rPunkM · 2 years agoThe Unbreakable Kryptos Codeplus-squareyoutu.beexternal-linkmessage-square1linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkThe Unbreakable Kryptos Codeplus-squareyoutu.becyph3rPunkM · 2 years agomessage-square1linkfedilink
Jake Farm@sopuli.xyzEnglish · 2 years agoIs there anything stopping this set up from being deployed else where?plus-squareyoutu.beexternal-linkmessage-square2linkfedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkIs there anything stopping this set up from being deployed else where?plus-squareyoutu.beJake Farm@sopuli.xyzEnglish · 2 years agomessage-square2linkfedilink
cyph3rPunkM · 2 years agoMalicious Backdoor in xz liblzmaplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up125arrow-down12
arrow-up123arrow-down1external-linkMalicious Backdoor in xz liblzmaplus-squareyoutu.becyph3rPunkM · 2 years agomessage-square0linkfedilink
cyph3rPunkM · 2 years agonew linux exploit is absolutely insaneplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down110
arrow-up10arrow-down1external-linknew linux exploit is absolutely insaneplus-squareyoutu.becyph3rPunkM · 2 years agomessage-square0linkfedilink
cyph3rPunkM · 2 years agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.beexternal-linkmessage-square4linkfedilinkarrow-up151arrow-down13
arrow-up148arrow-down1external-linkBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.becyph3rPunkM · 2 years agomessage-square4linkfedilink
SLfgb@feddit.nlEnglish · 2 years ago'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down12
arrow-up115arrow-down1external-link'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.comSLfgb@feddit.nlEnglish · 2 years agomessage-square0linkfedilink
demesisxEnglish · 2 years agoPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up126arrow-down11
arrow-up125arrow-down1external-linkPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.bedemesisxEnglish · 2 years agomessage-square0linkfedilink
cyph3rPunkM · 2 years agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up144arrow-down14
arrow-up140arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunkM · 2 years agomessage-square0linkfedilink
cyph3rPunkM · 2 years agoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down13
arrow-up110arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.becyph3rPunkM · 2 years agomessage-square0linkfedilink