KasTas

joined 11 months ago
[–] [email protected] 1 points 1 week ago

So, cloning a malicious repository on GitHub Codespaces using GitHub CLI will always leak the access token to the attacker’s hosts.

baha

[–] [email protected] 3 points 2 months ago

Kas turbūt su lietuviškaisiais incidentais labiausiai ir erzina... normalus postmortemas būtų naudingas visiems. O "viskas gerai, sutvarkėm" - tik subinės dangstymas lapais :(

Blemba, kuičiau BGP istoriją, tai lyg ir nieko įdomesnio, kaip kažkoks dingęs subnetas, nesugebėjau rasti.

 

Laughed my ass off:

"Since QEMU is a legitimate tool that is also digitally signed, Windows does not raise any alarms about it running, and security tools cannot scrutinize what malicious programs are running inside the virtual machine."

 

Tai užpylė serverinę priešgaisriniai čiaupai ar ne? :}

[–] [email protected] 1 points 3 months ago (1 children)

What about 38C3 this year? :}

[–] [email protected] 1 points 9 months ago

Excerpt on impact:

The attack can most effectively be carried out by a person who has administrative control over the network the target is connecting to. In that scenario, the attacker configures the DHCP server to use option 121. It’s also possible for people who can connect to the network as an unprivileged user to perform the attack by setting up their own rogue DHCP server.

[–] [email protected] 3 points 10 months ago

yay, signed patches

view more: next ›