#vulner

[ follow ]
www.theguardian.com
4 months ago
Career

The moment I knew: I was a ball of emotions. He reassured me: You can run, but run to me'

The protagonist of the story had never been in love and decided to change that at the age of 40.
After months of therapy, the protagonist decided to open their heart and give love another chance. [ more ]
DevOps.com
4 months ago
DevOps

Checkmarx Report Details Havoc Caused by 'Everything' Package on NPM Registry - DevOps.com

An individual uploaded a package called the 'Everything' package to the NPM registry that disrupts pipelines and exhausts storage space.
There is no process for reviewing packages before they are loaded into the NPM registry, leading to potential security risks. [ more ]
Zero Day Initiative
4 months ago
Information security

Zero Day Initiative - Looking Back at the ZDI Activities from 2023

Multiple Pwn2Own competitions were held in 2023, focusing on different targets and vulnerabilities.
The total prize money awarded during the competitions in 2023 was $2,126,750. [ more ]
WIRED
4 months ago
Information security

Google Fixes Nearly 100 Android Security Issues

Apple and Google released patches in December to fix serious flaws in their products
Atlassian and SAP also issued patches to fix critical bugs [ more ]
Theregister
4 months ago
Information security

Kaspersky reveals previously unknown hardware 'feature' used in iPhone attacks

Kaspersky researchers have discovered a previously unknown vulnerability in Apple iPhones that allows attackers to bypass hardware-based memory protection.
The vulnerability, addressed in CVE-2023-38606 and patched in July 2023, affected iPhones running iOS versions up to 16.6. [ more ]
www.vice.com
4 months ago
Artificial intelligence

This AI Chatbot is Trained to Jailbreak Other Chatbots

AI chatbots can be jailbroken by users who find ways to bypass safety filters and manipulate the system.
Researchers have developed an AI tool called Masterkey to automate the process of finding vulnerabilities in chatbot systems. [ more ]
Databreaches
4 months ago
Privacy technologies

Operation Triangulation: The last (hardware) mystery

Operation Triangulation research presented at 37C3
First public disclosure of exploits and vulnerabilities [ more ]
www.theguardian.com
4 months ago
Relationships

This is how we do it: I do tend to make a lot of noise during sex. The neighbours must hate me!'

The vulnerability I feel with Jude is occasionally a bit terrifying Jude is very vocal in bed, which I love.
I never have to wonder whether or not he's enjoying himself.
Open Data Science Conference
2 years ago
Data science

Why is Adversarial Robustness Critical for Machine Learning?

Machine learning models are vulnerable to security threats that can result in fraud, sabotage, and espionage.
ML practitioners need to embed trustworthiness in their models and address vulnerabilities through stress-testing and addressing credible threats. [ more ]
[ Load more ]