veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

293
active users

#exploiting

1 post1 participant0 posts today
Hacker News<p>Trigon: Exploiting coprocessors for fun and for profit (part 2)</p><p><a href="https://alfiecg.uk/2025/07/16/Trigon.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alfiecg.uk/2025/07/16/Trigon.h</span><span class="invisible">tml</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Trigon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trigon</span></a> <a href="https://mastodon.social/tags/Exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploiting</span></a> <a href="https://mastodon.social/tags/coprocessors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coprocessors</span></a> <a href="https://mastodon.social/tags/fun" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fun</span></a> <a href="https://mastodon.social/tags/profit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>profit</span></a> <a href="https://mastodon.social/tags/part2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>part2</span></a></p>
Osna.FM<p>Investigations by Dutch broadcaster RTL Nieuws and the Frankfurter Allgemeine Zeitung (FAZ) reveal a concerning link between German retailers and the illegal fi... <a href="https://news.osna.fm/?p=7851" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">news.osna.fm/?p=7851</span><span class="invisible"></span></a> | <a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/bombers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bombers</span></a> <a href="https://mastodon.social/tags/dutch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dutch</span></a> <a href="https://mastodon.social/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> <a href="https://mastodon.social/tags/german" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>german</span></a></p>
Alexandre Borges<p>Pwning Solana for Fun and Profit - Exploiting a Subtle Rust Bug for Validator RCE and Money-Printing:</p><p><a href="https://anatomi.st/blog/2025_06_27_pwning_solana_for_fun_and_profit" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anatomi.st/blog/2025_06_27_pwn</span><span class="invisible">ing_solana_for_fun_and_profit</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> <a href="https://mastodon.social/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/rce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rce</span></a> <a href="https://mastodon.social/tags/web3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web3</span></a> <a href="https://mastodon.social/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a></p>
Alexandre Borges<p>Pwning Solana for Fun and Profit - Exploiting a Subtle Rust Bug for Validator RCE and Money-Printing:</p><p><a href="https://anatomi.st/blog/2025_06_27_pwning_solana_for_fun_and_profit" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anatomi.st/blog/2025_06_27_pwn</span><span class="invisible">ing_solana_for_fun_and_profit</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/rce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rce</span></a> <a href="https://infosec.exchange/tags/web3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web3</span></a> <a href="https://infosec.exchange/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a></p>
Rene Robichaud<p>Taking over millions of developers exploiting an Open VSX Registry flaw<br><a href="https://securityaffairs.com/179398/hacking/taking-over-millions-of-developers-exploiting-an-open-vsx-registry-flaw.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179398/hac</span><span class="invisible">king/taking-over-millions-of-developers-exploiting-an-open-vsx-registry-flaw.html</span></a></p><p><a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CeptBiro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CeptBiro</span></a> <a href="https://mastodon.social/tags/Developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Developers</span></a> <a href="https://mastodon.social/tags/Exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploiting</span></a> <a href="https://mastodon.social/tags/OpenVSX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenVSX</span></a> <a href="https://mastodon.social/tags/RegistryFlaw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RegistryFlaw</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Jury orders <a href="https://hachyderm.io/tags/NSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSO</span></a> to pay $167 million for hacking <a href="https://hachyderm.io/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a> users<br>The verdict is a major victory for opponents of <a href="https://hachyderm.io/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> sellers.</p><p>A jury has awarded WhatsApp $167 million in punitive damages in a case the company brought against Israel-based <a href="https://hachyderm.io/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSOGroup</span></a> for <a href="https://hachyderm.io/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> a software <a href="https://hachyderm.io/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> that hijacked the <a href="https://hachyderm.io/tags/phones" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phones</span></a> of thousands of users. <br><a href="https://arstechnica.com/security/2025/05/jury-orders-nso-to-pay-167-million-for-hacking-whatsapp-users/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">05/jury-orders-nso-to-pay-167-million-for-hacking-whatsapp-users/</span></a></p>
Malcolm Nance<p>The citizens of Springfield Illinois told Kristi Noem to get the F out of their town and they don’t want her there! Secretary of Homeland Security Kristi Noem is <a href="https://defenseofliberty.social/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> the unaliving of Emma Schaefer for her political agenda in Springfield Illinois! 💙💙💙👏🏻👏🏻👏🏻 </p><p>1st <a href="https://defenseofliberty.social/tags/Amendment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amendment</span></a> … this is how you do it.</p>
PrivacyDigest<p>Threat posed by new <a href="https://mas.to/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> <a href="https://mas.to/tags/hyperjacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hyperjacking</span></a> <a href="https://mas.to/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> is hard to overstate</p><p>3 critical vulnerabilities in multiple <a href="https://mas.to/tags/VM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VM</span></a> products from VMware can give hackers unusually broad access to some of the most sensitive environments inside multiple customers’ networks, the company warned Tuesday.<br> <br>The class of <a href="https://mas.to/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> made possible by <a href="https://mas.to/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> the vulnerabilities is known under several names, including hyperjacking, hypervisor attack, or virtual machine escape.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> </p><p><a href="https://arstechnica.com/security/2025/03/vmware-patches-3-critical-vulnerabilities-in-multiple-product-lines/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/vmware-patches-3-critical-vulnerabilities-in-multiple-product-lines/</span></a></p>
PrivacyDigest<p>China’s <a href="https://mas.to/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://mas.to/tags/Spies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spies</span></a> Are Still <a href="https://mas.to/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> Telecoms—Now by <a href="https://mas.to/tags/Exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploiting</span></a> <a href="https://mas.to/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://mas.to/tags/Routers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Routers</span></a> </p><p>Despite high-profile attention and even US sanctions, the group hasn’t stopped or even slowed its operation, including the <a href="https://mas.to/tags/breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>breach</span></a> of two more US <a href="https://mas.to/tags/telecoms" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telecoms</span></a>.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/telecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telecom</span></a></p><p><a href="https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/chinas-salt-ty</span><span class="invisible">phoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/</span></a></p>
:radare2: radare :verified:<p>❄️Ready for the Advent of Radare? ❄️<br>--&gt; <a href="https://radare.org/advent" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">radare.org/advent</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/aor24" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aor24</span></a><br>Starting tomorrow, December 1st we will release every day a new article with general knowledge, tricks, scripts and challenges to solve with radare2 covering topics from <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/firmwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmwareanalysis</span></a> <a href="https://infosec.exchange/tags/debugging" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debugging</span></a> <a href="https://infosec.exchange/tags/exploiting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploiting</span></a> <a href="https://infosec.exchange/tags/binaryanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>binaryanalysis</span></a> <a href="https://infosec.exchange/tags/lowlevel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lowlevel</span></a> <a href="https://infosec.exchange/tags/assembly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>assembly</span></a></p>
eMiliLeftwing, Feminist Book recommendations please!