veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

296
active users

#vulnerabilities

5 posts5 participants0 posts today
Marcus "MajorLinux" Summers<p>Time to go patch those drivers!</p><p>NVIDIA reveal more GPU driver security issues for July 2025 </p><p><a href="https://www.gamingonlinux.com/2025/07/nvidia-reveal-more-gpu-driver-security-issues-for-july-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gamingonlinux.com/2025/07/nvid</span><span class="invisible">ia-reveal-more-gpu-driver-security-issues-for-july-2025/</span></a></p><p><a href="https://toot.majorshouse.com/tags/Nvidia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nvidia</span></a> <a href="https://toot.majorshouse.com/tags/GPU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GPU</span></a> <a href="https://toot.majorshouse.com/tags/Drivers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Drivers</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://toot.majorshouse.com/tags/Patches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patches</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://toot.majorshouse.com/tags/Gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaming</span></a> <a href="https://toot.majorshouse.com/tags/Hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hardware</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/AIslop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIslop</span></a> and fake reports are exhausting <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/bugbounties" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounties</span></a><br>The world of <a href="https://hachyderm.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> is not immune to this problem. In last year, people across the cybersecurity industry have raised concerns about <a href="https://hachyderm.io/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://hachyderm.io/tags/slop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>slop</span></a> <a href="https://hachyderm.io/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a> reports, meaning reports that claim to have found <a href="https://hachyderm.io/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> that do not actually exist, because they were created with a <a href="https://hachyderm.io/tags/largelanguagemodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>largelanguagemodel</span></a> (<a href="https://hachyderm.io/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a>) that simply made up the <a href="https://hachyderm.io/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a>, and then packaged it into a professional-looking writeup<br><a href="https://techcrunch.com/2025/07/24/ai-slop-and-fake-reports-are-exhausting-some-security-bug-bounties/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/07/24/ai-s</span><span class="invisible">lop-and-fake-reports-are-exhausting-some-security-bug-bounties/</span></a></p>
Schneier on Security RSS<p>Another Supply Chain Vulnerability</p><p>ProPublica is reporting:<br>Microsoft is using engineers in China to help maintain the Defense Department’s ... <a href="https://www.schneier.com/blog/archives/2025/07/another-supply-chain-vulnerability.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/07/another-supply-chain-vulnerability.html</span></a></p><p> <a href="https://burn.capital/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/supplychain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplychain</span></a> <a href="https://burn.capital/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://burn.capital/tags/risks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>risks</span></a></p>
N-gated Hacker News<p>🚨 Breaking News: <a href="https://mastodon.social/tags/Developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Developers</span></a> unveil groundbreaking strategy to deal with skeptics of io_uring: just ignore them! 🙉 Because who needs <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> when you have beautiful, error-free code, right? After all, <a href="https://mastodon.social/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> are just misunderstood features waiting to be automated away! 🤖✨<br><a href="https://github.com/axboe/liburing/discussions/1047" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/axboe/liburing/disc</span><span class="invisible">ussions/1047</span></a> <a href="https://mastodon.social/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BreakingNews</span></a> <a href="https://mastodon.social/tags/io_uring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>io_uring</span></a> <a href="https://mastodon.social/tags/Automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Automation</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ngated</span></a></p>
Hacker News<p>MCP Security Vulnerabilities and Attack Vectors</p><p><a href="https://forgecode.dev/blog/prevent-attacks-on-mcp/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forgecode.dev/blog/prevent-att</span><span class="invisible">acks-on-mcp/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/MCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCP</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/AttackVectors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AttackVectors</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a></p>
DWD<p>My friend and her colleagues have authored a paper: Architectural Backdoors in Deep Learning: A Survey of Vulnerabilities, Detection, and Defense</p><p>It's not for the faint of heart:</p><p><a href="https://arxiv.org/abs/2507.12919" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2507.12919</span><span class="invisible"></span></a></p><p><a href="https://techhub.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://techhub.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://techhub.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://techhub.social/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> <a href="https://techhub.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://techhub.social/tags/Defense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Defense</span></a> <a href="https://techhub.social/tags/DeepLearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeepLearning</span></a></p>
knoppix<p>Firmware flaws in 240+ Gigabyte motherboards (2017–2021) could allow stealth malware to bypass Secure Boot and take full control. ⚠️🛡️</p><p>Fixes exist, but nearly half the boards are unsupported due to EOL status—leaving many users exposed. 💻❌<br>Check for updates or consider replacing hardware.</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@techspot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>techspot</span></a></span> </p><p><a href="https://www.techspot.com/news/108688-firmware-flaws-over-200-gigabyte-motherboards-could-lead.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techspot.com/news/108688-firmw</span><span class="invisible">are-flaws-over-200-gigabyte-motherboards-could-lead.html</span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Gigabyte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gigabyte</span></a> <a href="https://mastodon.social/tags/Firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firmware</span></a> <a href="https://mastodon.social/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> <a href="https://mastodon.social/tags/PCSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCSecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/Motherboard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Motherboard</span></a> <a href="https://mastodon.social/tags/Boot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Boot</span></a> <a href="https://mastodon.social/tags/EOL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EOL</span></a> <a href="https://mastodon.social/tags/Update" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Update</span></a> <a href="https://mastodon.social/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a></p>
Schneier on Security RSS<p>Security Vulnerabilities in ICEBlock</p><p>The ICEBlock tool has vulnerabilities:<br>The developer of ICEBlock, an iOS app for anonymously reporting sightings of US I... <a href="https://www.schneier.com/blog/archives/2025/07/security-vulnerabilities-in-iceblock.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/07/security-vulnerabilities-in-iceblock.html</span></a></p><p> <a href="https://burn.capital/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/anonymity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonymity</span></a> <a href="https://burn.capital/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://burn.capital/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a></p>
N-gated Hacker News<p>🎢 Ah, another tech love letter to your GitHub overlords, where <a href="https://mastodon.social/tags/Netflix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netflix</span></a> pretends their "Metaflow" isn't just another rehash of buzzwords to make AI/ML sound like rocket science. 🚀 Meanwhile, mere mortals are left to wonder if "managing prompts" and "fixing vulnerabilities" involves anything more than turning it off and on again. 🤪<br><a href="https://github.com/Netflix/metaflow" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Netflix/metaflow</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/techbuzzwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techbuzzwords</span></a> <a href="https://mastodon.social/tags/Metaflow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metaflow</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/ML" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ML</span></a> <a href="https://mastodon.social/tags/prompts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prompts</span></a> <a href="https://mastodon.social/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ngated</span></a></p>
Ars Technica News<p>Google finds custom backdoor being installed on SonicWall network devices <a href="https://arstechni.ca/xwQo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechni.ca/xwQo</span><span class="invisible"></span></a> <a href="https://c.im/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://c.im/tags/sonicwall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sonicwall</span></a> <a href="https://c.im/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://c.im/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://c.im/tags/Biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biz</span></a>&amp;IT</p>
IT News<p>Google finds custom backdoor being installed on SonicWall network devices - Researchers from the Google Threat Intelligence Group said t... - <a href="https://arstechnica.com/security/2025/07/google-finds-custom-backdoor-being-installed-on-sonicwall-network-devices/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/google-finds-custom-backdoor-being-installed-on-sonicwall-network-devices/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/sonicwall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sonicwall</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Hacker News<p>Train Brakes Can Be Hacked over Radio–and the Industry Knew for 20 Years</p><p><a href="https://www.securityweek.com/train-hack-gets-proper-attention-after-20-years-researcher/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/train-hack-ge</span><span class="invisible">ts-proper-attention-after-20-years-researcher/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/TrainSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrainSafety</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/RadioSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RadioSecurity</span></a> <a href="https://mastodon.social/tags/IndustryAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IndustryAwareness</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a></p>
Syft<p>Just picked up my holiday photos!<br>50% landscapes, 50% Grype being <span class="h-card" translate="no"><a href="https://fosstodon.org/@grype" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>grype</span></a></span> 👽📷<br><a href="https://fosstodon.org/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/family" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>family</span></a></p>
Manuel 'HonkHase' Atug<p><a href="https://chaos.social/tags/PerfektBlue" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PerfektBlue</span></a> <a href="https://chaos.social/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> <a href="https://chaos.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> Expose Millions of <a href="https://chaos.social/tags/Vehicles" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vehicles</span></a> to Remote Code Execution</p><p>"Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully <a href="https://chaos.social/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a>, could allow remote code execution <a href="https://chaos.social/tags/rce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rce</span></a> on millions of <a href="https://chaos.social/tags/transport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transport</span></a> vehicles from different vendors."<br><a href="https://thehackernews.com/2025/07/perfektblue-bluetooth-vulnerabilities.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/07/perf</span><span class="invisible">ektblue-bluetooth-vulnerabilities.html</span></a></p>
Hacker News<p>ESIM Security</p><p><a href="https://security-explorations.com/esim-security.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security-explorations.com/esim</span><span class="invisible">-security.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ESIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESIM</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/ESIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESIM</span></a> <a href="https://mastodon.social/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://mastodon.social/tags/mobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobile</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
ADMIN magazine<p>From the ADMIN Update newsletter: Learn how the tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations<br><a href="https://www.admin-magazine.com/Archive/2025/85/ASM-tools-and-strategies-for-threat-management?utm_source=mam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Archive/202</span><span class="invisible">5/85/ASM-tools-and-strategies-for-threat-management?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/ASM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASM</span></a> <a href="https://hachyderm.io/tags/tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tools</span></a> <a href="https://hachyderm.io/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/AttackSurface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AttackSurface</span></a> <a href="https://hachyderm.io/tags/SaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SaaS</span></a></p>
redoracle<p>Discover how to mitigate AI developer vulnerabilities and enhance security in AI systems. <a href="https://mastodon.social/tags/AIDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIDevelopment</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://redoracle.com/News/Mitigating-AI-Developer-Vulnerabilities.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redoracle.com/News/Mitigating-</span><span class="invisible">AI-Developer-Vulnerabilities.html</span></a></p>
BCWHS<p>CISA Catalog of Known Exploited Vulnerabilities<br>Choose your products that to compare to current CVEs. The list is generated from current CVEs. Download them or create a custom GRC plan.<br><a href="https://blackcatwhitehatsecurity.com/cveProducts.cfm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blackcatwhitehatsecurity.com/c</span><span class="invisible">veProducts.cfm</span></a><br><a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/Catalog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Catalog</span></a> <a href="https://mastodon.social/tags/Known" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Known</span></a> <a href="https://mastodon.social/tags/Exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploited</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a></p>
Bob Carver<p>This AI Is Outranking Humans as a Top Software Bug Hunter<br><a href="https://www.pcmag.com/news/this-ai-is-outranking-humans-as-a-top-software-bug-hunter" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pcmag.com/news/this-ai-is-outr</span><span class="invisible">anking-humans-as-a-top-software-bug-hunter</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a> <a href="https://infosec.exchange/tags/bughunter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bughunter</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2183857/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2183857/</span><span class="invisible"></span></a> Banks in S. Korea, Taiwan, Thailand <a href="https://pubeurope.com/tags/Economy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Economy</span></a> <a href="https://pubeurope.com/tags/outlook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>outlook</span></a> <a href="https://pubeurope.com/tags/RetailNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RetailNews</span></a> <a href="https://pubeurope.com/tags/RetailProblems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RetailProblems</span></a> <a href="https://pubeurope.com/tags/retailers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retailers</span></a> <a href="https://pubeurope.com/tags/sector" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sector</span></a> <a href="https://pubeurope.com/tags/SouthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SouthKorea</span></a> <a href="https://pubeurope.com/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a></p>