Login
Discover
Waves
Decks
Plus
Login
Signup
Topics
New
Trending
Hot
New
New
Trending
Hot
New
Payouts
Muted
Promoted
Global
Top communities
Create decentralized community
latest #vulnerabilities created topics on internet
cmplxty
Personal Privacy
2026-02-14 01:31
The Spread Vector
Hi fellow Hiveians, Today I wanted to complain a little bit about more and more services. The Spread Vector Sadly, one of the things that we have not a lot of control over these days is the spread. What
$ 3.543
252
4
louis88
HiveDevs
2025-08-10 15:59
Keeping HIVE and it's Projects safe - My Sunday dedicated to more secure Frontends on HIVE.
Many of you already know what I do on the side. I spend a good amount of my free time doing security analysis and penetration testing on web applications here in our Hive ecosystem. I do this voluntarily,
$ 23.722
300
15
vikvitnik
The Mindful AI
2025-04-23 15:50
Endor Labs, a startup offering tools to detect vulnerabilities in AI-Generated Code, closes $93 million in funding
We may have heard on more than one occasion the term “Vibe Coding”, which has become popular in social networks. It suggests a new way of “programming”, in which the programmer is driven by the AI's ability
$ 5.335
293
1
chaintuts
Programming & Dev
2025-01-12 20:57
Insidious Inputs - Three Types of Common Software Vulnerabilities (Video Version)
Software #vulnerabilities are a big part of security. Learn about path traversal, cross-site scripting, and buffer overflows with this free and open-licensed #tutorial, including example code demos!
$ 0.153
1
darth-azrael
retrogaming
2026-03-29 17:34
Promoted
Electronic Games (Winter 1981)
Electronic Games was really the grandfather of video game magazines. Unfortunately it was not long lived as it was introduced shortly before the video game crash of that era. This is the first issue from
$ 1.523
193
6
chaintuts
Programming & Dev
2025-01-07 13:42
Insidious Inputs - Three Common Types of Software Vulnerabilities
Curious about how attackers exploit vulnerable software, and how those vulnerabilities work? My latest free and open licensed #tutorial dives into three common software #vulnerabilities - the #coding process,
$ 0.021
1
1
mgibson
LeoFinance
2023-08-22 21:03
Understanding DeFi Protocol Vulnerabilities: Analyzing the Recent Harbor Hacks
DeFi doesn’t functions like traditional financial systems that depends on centralized intermediaries like banks. It supports decentralized ecosystem and functions on blockchain technology in the field
$ 6.419
94
1
jaichai
proofofbrain
2022-07-06 06:01
(JaiChai) "Copy and Paste at your own peril.."
"Copy and Paste at your own peril.."
$ 0.000
3
mtl1979
exchanges
2022-06-05 00:13
Recent trend on exchange hacking...
A lot of smaller exchanges have been hacked in last few years. A new trend in hacking has been to target machines used to maintain exchanges instead of trying to hack the exchange itself... A lot of exchange
$ 0.000
1
anna.kathaxrina
Liketu
2026-03-28 17:01
Promoted
The Subtle Art of Not Explaining
Not everything needs an explanation. Not every decision requires approval. There is something deeply liberating in choosing your path and letting it stand on its own. I used to feel the need to justify
$ 0.328
43
3
yehey
cybersecurity
2022-03-29 02:59
32 Known Exploited Vulnerabilities added to the Catalog
CISA has added 32 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious
$ 4.275
24
robert-ideas
critical
2022-03-11 20:27
Hacker News Critical Security Flaws Reported in Moxa MXview Network Management Software
Multiple critical vulnerabilities have been discovered in Moxa MXview web-based industrial network management #software, some of which could be exploited by an unauthenticated attacker to execute remote
$ 0.000
0
joerhino
STEMGeeks
2021-10-18 12:49
IT AUDITS ARE NOT THE ULTIMATE ANSWER
So I had a question regarding audits making one secure. The question related to my article and post here Security Testing for Your SMB: What You Need to Know. I will stick to my arena of experience in
$ 2.204
47
5
joerhino
StemSocial
2021-10-17 08:39
Security Testing for Your SMB: What You Need to Know
Everyone wants to keep their IT in tip-top form. Your business technology aids in both profitability and efficiency. You do not want to be messing with downtime. You also want to avoid violating any industry
$ 12.327
308
7
tonyz
Black And White
2026-03-31 13:43
Promoted
Lock & Chain. Monomad Challenge.
Cold Steel on a grey day.
$ 7.332
1134
5
yehey
cybersecurity
2021-09-03 12:40
Analysis of a Phishing Kit (that targets Chase Bank)
Emsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free. The SynAck ransomware gang launched its operation in 2017 but rebranded as the El_Cometa
$ 0.901
25
yehey
cybersecurity
2021-08-06 02:40
Open Source CyberSecurity News - Hacking a Capsule Hotel
Black Hat 2021, “Hacking a Capsule Hotel – Ghost in the Bedrooms,” by Supa A series of vulnerabilities in internet of things (IoT) devices often found in connected hotel rooms allowed a researcher to take
$ 3.573
27
twr
bug
2020-06-14 15:00
WhatsApp Bug (Or Maybe A Feature) Leaks Users Numbers In Google Search
While WhatsApp is becoming popular for online businesses, especially amidst the global lockdown due to COVID-19, a glitch has raised privacy concerns. Reportedly, a WhatsApp bug exists in the ‘Click to
$ 0.000
3
1
thepsychco
infosec
2020-02-18 22:13
2-19-2020_We_6.35pm_Information Security Risks Access Controls Mitigation Threats Warehouse Hierarchy Sources
2-19-2020_We_6.35pm_Information Security Risks Controls Warehouse Hierarchy Sources Streamyard participate streamyard.com/m3i3sr9rh5 View www.youtube.com/watch?v=WRJtjU2DT-0
$ 0.000
1
noemilunastorta
Lifestyle
2026-04-02 15:37
Promoted
Trying a new job, a real nightmare. Better to be a housewife than have a dishonest boss!/ Probar un nuevo trabajo, una verdadera pesadilla. ¡Mejor ser ama de casa que tener una jefa deshonesta!
Happy Thursday blog friends, sorry for my absence but these days I was doing a test for a new job which was a nightmare and now I'll tell you everything, at the interview I was told that it was a simple
$ 5.736
95
9
doifeellucky
infosec
2020-02-10 12:39
Millions of patient data records could be easily accessible in the internet!
IMG SRC Not very surprising to many in the InfoSec business but maybe an "eye opener" to the masses that this has made mainstream headlines in one of the most popular tv news shows in Germany.
$ 0.715
20
7
doifeellucky
infosec
2019-11-12 02:00
in part via threatpost.com: How to Secure Critical Infrastructure When Patching Isn’t Possible... by me... what you can learn from that!
Author: Threatpost Mission-critical systems can’t just be switched off to apply security updates — so patching can take weeks if not years. By Amir Levintal, Infosec Insider Cyberattacks are on the rise
$ 6.088
133
20
doifeellucky
breach
2019-11-09 21:44
via threatpost.com: Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone
Author: Tara Seals Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies. Big businesses are constantly under attack, and that affects everyone
$ 0.287
8
1
doifeellucky
infosec
2019-10-29 08:02
via threatpost.com: Pwn2Own Expands Into Industrial Control Systems Hacking
Author: Lindsey O'Donnell White-hat hackers will now have the chance to win $20,000 for sniffing out remote code-execution flaws in industrial control systems. Industrial control systems (ICS) used to
$ 0.656
13
2