Tootfinder

Opt-in global Mastodon full text search. Join the index!

@heiseonline@social.heise.de
2024-05-15 05:14:14

#Verpasstodon
Einige der zuletzt hier besonders häufig geteilten #News:
Jetzt updaten! Erneut Zeroday-Lücke in Google Chrome, Exploit verfügbar

@privacity@social.linux.pizza
2024-04-15 06:01:10

0day SMS/Image per Android e iOS in vendita. Scopriamo il mondo di questi preziosi e rari exploit
poliverso.org/display/0477a01e
0day SMS/Image per Android e iOS in vendita. Scopriamo il mondo di questi preziosi e r…

@andres4ny@social.ridetrans.it
2024-05-14 16:52:22

Fucking google, you're killing me. I can't keep up a pace of *3* chromium releases (and associated debian security advisories) in a week.

[N/A][339458194] High CVE-2024-4761: Out of bounds write in V8. Reported by Anonymous on 2024-05-09

Google is aware that an exploit for CVE-2024-4761 exists in the wild.
@mrjau@inosoft.social
2024-04-12 06:12:22

Internet Wetter:
Langsam wird es stürmich.
heise.de/news/Linux-Kernel-Neu

@xtaran@chaos.social
2024-04-10 14:08:08

The xz backdoor storm isn't over yet and the next storm seems coming up: #LocalPrivilegeEscalation in the #Linux #kernel 5.15 to 6.5 (at least):

@r_cybersecurity@botsin.space
2024-02-15 05:42:29

Microsoft has fixed a zero-day exploit that was being used to circumvent Microsoft Defender SmartScreen, particularly targeting financial market traders. reddit.com/r/cybersecurity/com

@privacity@social.linux.pizza
2024-04-12 16:25:25

Spectre v2 colpisce Linux: il nuovo exploit che mette in crisi i processori Intel
poliverso.org/display/0477a01e
Spectre v2 colpisce Linux: il nuovo exploit che mette in crisi i processori Intel Gli specialisti del …

@arXiv_csCR_bot@mastoxiv.page
2024-04-15 06:47:53

LLM Agents can Autonomously Exploit One-day Vulnerabilities
Richard Fang, Rohan Bindu, Akul Gupta, Daniel Kang
arxiv.org/abs/2404.08144

@arXiv_quantph_bot@mastoxiv.page
2024-02-15 07:13:14

Complete complementarity relations in tree level QED processes
Massimo Blasone, Silvio De Siena, Gaetano Lambiase, Cristina Matrella, Bruno Micciola
arxiv.org/abs/2402.09195

@arXiv_csLG_bot@mastoxiv.page
2024-02-15 06:51:17

Soft Prompt Threats: Attacking Safety Alignment and Unlearning in Open-Source LLMs through the Embedding Space
Leo Schwinn, David Dobre, Sophie Xhonneux, Gauthier Gidel, Stephan Gunnemann
arxiv.org/abs/2402.09063

@andres4ny@social.ridetrans.it
2024-05-14 16:52:22

Fucking google, you're killing me. I can't keep up a pace of *3* chromium releases (and associated debian security advisories) in a week.

[N/A][339458194] High CVE-2024-4761: Out of bounds write in V8. Reported by Anonymous on 2024-05-09

Google is aware that an exploit for CVE-2024-4761 exists in the wild.
@arXiv_qfinTR_bot@mastoxiv.page
2024-03-15 07:25:53

Deep Limit Order Book Forecasting
Antonio Briola, Silvia Bartolucci, Tomaso Aste
arxiv.org/abs/2403.09267 arxiv.org/p…

@arXiv_csSE_bot@mastoxiv.page
2024-02-15 06:52:59

OmniBOR: A System for Automatic, Verifiable Artifact Resolution across Software Supply Chains
Bharathi Seshadri, Yongkui Han, Chris Olson, David Pollak, Vojislav Tomasevic
arxiv.org/abs/2402.08980

@arXiv_csDC_bot@mastoxiv.page
2024-04-15 06:48:41

Efficient Interactive LLM Serving with Proxy Model-based Sequence Length Prediction
Haoran Qiu, Weichao Mao, Archit Patke, Shengkun Cui, Saurabh Jha, Chen Wang, Hubertus Franke, Zbigniew T. Kalbarczyk, Tamer Ba\c{s}ar, Ravishankar K. Iyer
arxiv.org/abs/2404.08509

@teledyn@mstdn.ca
2024-04-10 19:57:06

This is how civilization ends, not with a bang, but with the whimpers of end-of-life devices no longer supported by the manufacturer. 😅
Critical takeover vulnerabilities in 92,000 D-Link devices under active exploitation
arstechnica.com/security/2024/

@arXiv_csGT_bot@mastoxiv.page
2024-03-15 06:50:11

Strategizing against Q-learners: A Control-theoretical Approach
Yuksel Arslantas, Ege Yuceel, Muhammed O. Sayin
arxiv.org/abs/2403.08906

@macandi@social.heise.de
2024-04-19 08:24:00

"iMessage abschalten": Warnung vor angeblichem Exploit verunsichert Nutzer
Ein bekanntes Krypto-Wallet warnt iOS-Nutzer vor einem "hochriskanten Zero-Day-Exploit für iMessage". Der angebliche Exploit könnte aber ein Scam sein.

@arXiv_eessIV_bot@mastoxiv.page
2024-03-15 06:54:01

VM-UNET-V2 Rethinking Vision Mamba UNet for Medical Image Segmentation
Mingya Zhang, Yue Yu, Limei Gu, Tingsheng Lin, Xianping Tao
arxiv.org/abs/2403.09157

@netsec@botsin.space
2024-05-05 23:54:22

Exploit Education :: Andrew Griffiths' Exploit Education exploit.education/

@arXiv_eessSY_bot@mastoxiv.page
2024-03-14 08:37:49

This arxiv.org/abs/2401.16183 has been replaced.
initial toot: mastoxiv.page/@arXiv_ees…

@arXiv_csNI_bot@mastoxiv.page
2024-04-15 06:55:33

Resource-aware Deployment of Dynamic DNNs over Multi-tiered Interconnected Systems
Chetna Singhal, Yashuo Wu, Francesco Malandrino, Marco Levorato, Carla Fabiana Chiasserini
arxiv.org/abs/2404.08060

@arXiv_hepex_bot@mastoxiv.page
2024-03-15 07:01:58

Up and Down Quark Structure of the Proton
D0 Collaboration
arxiv.org/abs/2403.09331 arxiv.org/pdf/2403.09331

@arXiv_astrophCO_bot@mastoxiv.page
2024-04-15 07:00:15

Euclid preparation. XLII. A unified catalogue-level reanalysis of weak lensing by galaxy clusters in five imaging surveys
Euclid Collaboration, M. Sereno, S. Farrens, L. Ingoglia, G. F. Lesci, L. Baumont, G. Covone, C. Giocoli, F. Marulli, S. Miranda La Hera, M. Vannier, A. Biviano, S. Maurogordato, L. Moscardini, N. Aghanim, S. Andreon, N. Auricchio, M. Baldi, S. Bardelli, F. Bellagamba, C. Bodendorf, D. Bonino, E. Branchini, M. Brescia, J. Brinchmann, S. Camera, V. Capobianco, C. Car…

@grifferz@social.bitfolk.com
2024-04-11 20:20:36

"At the very least we now have a clearly defined avenue for getting code that matters for Linux only merged into OpenSSH upstream: just get some nation state actor to use it as a vehicle for an exploit, and bam, there's your window of opportunity to get something merged!" – Lennart
lwn.net/Articles/968130/

@schtobia@augsburg.social
2024-05-13 07:43:22

Unceasing warfare gives rise to its own social conditions which have been similar in all epochs. People enter a permanent state of alertness to ward off attacks. You seethe absolute rule of the autocrat. All new things become dangerous frontier districts - new planets, new economic areas to exploit, new ideas or new devices, visitors - everything suspect. Feudalism takes firm hold, sometimes disguised as a politbureau or similar structure, but always present. 1/2

@metacurity@infosec.exchange
2024-02-29 11:51:30

Seneca stablecoin hacker returns stolen funds after $6.4M exploit
cointelegraph.com/news/seneca-

@Techmeme@techhub.social
2024-02-21 22:20:46

Researchers warn that a high-risk vulnerability under attack in remote access tool ConnectWise ScreenConnect is "trivial and embarrassingly easy" to exploit (Carly Page/TechCrunch)
techcrunch.com/2024/02/21/rese

The "creator economy" is a shiny veneer hiding an ugly truth:
it has nothing to do with empowering creators.
It's exploiting them for maximum profit.
Tech has sold us a fairy tale that dedicating yourself to your creative passion can be a viable career path in the modern world.
But they conveniently leave out the part where they ruthlessly exploit those creators to line their pockets.
Take Spotify, for example. They love to tout how they "sup…

@migueldeicaza@mastodon.social
2024-04-01 19:11:48

@… Enjoy: github.com/amlweems/xzbot

@arXiv_csCR_bot@mastoxiv.page
2024-03-14 06:48:02

Information Leakage through Physical Layer Supply Voltage Coupling Vulnerability
Sahan Sanjaya, Aruna Jayasena, Prabhat Mishra
arxiv.org/abs/2403.08132

@arXiv_mathNA_bot@mastoxiv.page
2024-03-14 08:39:59

This arxiv.org/abs/2112.09743 has been replaced.
link: scholar.google.com/scholar?q=a

@soc_i_ety@mstdn.ca
2024-03-09 16:42:43

The past is not some mythical wonder moment to get all nostalgic about. The past is slavery, the servitude of woman, colonization, mass murder, rape and pillaging of peaceful Indigenous and other good peoples, the assault on the natural world out of pure selfishness and a penchant to exploit and destroy.
Leave it all behind.
Progress is the opposite of all these evils.
Want a progressive future.
Be politically progressive.
It's the only way forward to a …

@markhburton@mstdn.social
2024-03-09 20:14:53

Hmm, who could that be then Govey? Tory chums?
“overturn, exploit or undermine the UK’s system of liberal democracy to confer advantages or disadvantages on specific groups”
Revealed: legal fears over Michael Gove’s new definition of ‘extremism’ | Politics | The Guardian

@arXiv_hepph_bot@mastoxiv.page
2024-04-12 08:41:11

This arxiv.org/abs/2212.04954 has been replaced.
link: scholar.google.com/scholar?q=a

@luana@tech.lgbt
2024-05-09 02:11:58

It would be so fucking cool if an untethered exploit came out to iPad and they just casually released Asahi Linux for it…

@arXiv_csIR_bot@mastoxiv.page
2024-03-13 06:50:13

LIST: Learning to Index Spatio-Textual Data for Embedding based Spatial Keyword Queries
Ziqi Yin, Shanshan Feng, Shang Liu, Gao Cong, Yew Soon Ong, Bin Cui
arxiv.org/abs/2403.07331

@arXiv_eessSP_bot@mastoxiv.page
2024-03-13 07:33:40

Analysis of Intelligent Reflecting Surface-Enhanced Mobility Through a Line-of-Sight State Transition Model
Hongtao Zhang, Haoyan Wei
arxiv.org/abs/2403.07337

@inthehands@hachyderm.io
2024-04-06 15:50:12

In the wake of the xz exploit, I quipped, “Free software, eh, fine, whatever. What does •sustainable• software look like?”
I haven’t heard anybody give a more thoughtful or more useful answer to that question than @… in this blog post, which has not one but •two• crucial insights:

@arXiv_eessSY_bot@mastoxiv.page
2024-03-14 08:37:49

This arxiv.org/abs/2401.16183 has been replaced.
initial toot: mastoxiv.page/@arXiv_ees…

@arXiv_astrophCO_bot@mastoxiv.page
2024-04-15 07:00:15

Euclid preparation. XLII. A unified catalogue-level reanalysis of weak lensing by galaxy clusters in five imaging surveys
Euclid Collaboration, M. Sereno, S. Farrens, L. Ingoglia, G. F. Lesci, L. Baumont, G. Covone, C. Giocoli, F. Marulli, S. Miranda La Hera, M. Vannier, A. Biviano, S. Maurogordato, L. Moscardini, N. Aghanim, S. Andreon, N. Auricchio, M. Baldi, S. Bardelli, F. Bellagamba, C. Bodendorf, D. Bonino, E. Branchini, M. Brescia, J. Brinchmann, S. Camera, V. Capobianco, C. Car…

@anildash@me.dm
2024-04-03 19:25:03

There's been a ton of conversation about the xz exploit, but the real reason this kind of thing could even happen is because of *human* vulnerability, not a technology vulnerability. So we have to take a deep look at how we truly support the people who make open source happen. Here's the real, substantive investment @… has been providing:

@arXiv_hepex_bot@mastoxiv.page
2024-02-15 07:21:33

Combination of measurements of the top quark mass from data collected by the ATLAS and CMS experiments at $\sqrt{s}=7$ and 8 TeV
CMS, ATLAS Collaborations
arxiv.org/abs/2402.08713

@arXiv_csRO_bot@mastoxiv.page
2024-03-12 06:54:31

SiLVR: Scalable Lidar-Visual Reconstruction with Neural Radiance Fields for Robotic Inspection
Yifu Tao, Yash Bhalgat, Lanke Frank Tarimo Fu, Matias Mattamala, Nived Chebrolu, Maurice Fallon
arxiv.org/abs/2403.06877

@j12t@social.coop
2024-04-21 02:10:18

Somebody is building a low-latency pipeline from #security advisory to attack by means of #AI right now, I'm sure.

@arXiv_statML_bot@mastoxiv.page
2024-04-12 07:33:17

Inferring Change Points in High-Dimensional Linear Regression via Approximate Message Passing
Gabriel Arpino, Xiaoqi Liu, Ramji Venkataramanan
arxiv.org/abs/2404.07864

@macandi@social.heise.de
2024-02-23 10:29:00

Shortcuts-Lücke: Zero-Day-Exploit konnte Apples Systemsicherheit aushebeln
Apples TCC-Verfahren soll eigentlich verhindern, dass böswillige Apps ausgeführt werden. Mittels Shortcuts war das doch möglich. Die Lücke ist gestopft.

@sofia@chaos.social
2024-04-07 13:22:15

it's kinda funny (in the "not really" sort of way) when people act upset about companies like Nintendo etc "hurt their own fans".
like, yeah, they are to a large extent a #copyright company, with some game making and hardware design attached.
the point of copyright is to exploit your consumers. and governments use a lot of money and force to maintain this explo…

@josemurilo@mato.social
2024-04-07 12:37:46

"#Market traders engage with one another at a designated time & place, abiding by shared rules; #capitalists exploit their unrivalled control over time & space in order to impose their rules on everyone else. Buyers & sellers on eBay are participating in a market; eBay Inc. is participat…

@adam@windbag.org
2024-04-06 16:40:41

Japan score just 30 seconds into the match. That looked like a video game exploit.
#USWNT :uswnt: #SheBelievesCup

@mgorny@social.treehouse.systems
2024-03-29 17:49:49

You've probably seen it elsewhere already, but: xz-utils 5.6.0 and 5.6.1 release tarballs contain an elaborate exploit that injects a backdoor into SSH. #Gentoo systems shouldn't be affected since our OpenSSH doesn't link to liblzma — apparently the exploit targets distributions that patch OpenSSH to link with libsystemd, which in turn may link to liblzma. However, it's not clear if the exploits doesn't do anything else, so we've masked the new versions.
lzip is not affected.
openwall.com/lists/oss-securit

@marcel@waldvogel.family
2024-04-24 14:35:59

A vulnerability closed in 2022 has been in active use since 2019 and is still ongoing. 5 years, wow!
Please f*cking update your systems at least every two years (actually, much more often!)!!!
arstechnica.com/security/2024/…

@Techmeme@techhub.social
2024-04-20 22:40:45

Researchers: when given 15 CVE descriptions, GPT-4 autonomously exploited 87% of the vulnerabilities, compared to 0% for every other model tested (Thomas Claburn/The Register)
theregister.com/2024/04/17/gpt

@arXiv_mathST_bot@mastoxiv.page
2024-03-12 08:49:41

This arxiv.org/abs/2402.18921 has been replaced.
initial toot: mastoxiv.page/@arXiv_mat…

@arXiv_quantph_bot@mastoxiv.page
2024-03-13 07:13:44

Simulating Quantum Circuits by Model Counting
Jingyi Mei, Marcello Bonsangue, Alfons Laarman
arxiv.org/abs/2403.07197

@netsec@botsin.space
2024-03-04 16:54:22

Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE thedfirreport.com/2024/03/04/t

@arXiv_econEM_bot@mastoxiv.page
2024-03-12 08:41:40

This arxiv.org/abs/2207.07318 has been replaced.
link: scholar.google.com/scholar?q=a

@privacity@social.linux.pizza
2024-05-07 07:06:17

Google aumenta di 10 volte le ricompense per gli exploit su APP Android
poliverso.org/display/0477a01e
Google aumenta di 10 volte le ricompense per gli exploit su APP Android Google sta decuplicando

@arXiv_hepex_bot@mastoxiv.page
2024-02-15 07:21:33

Combination of measurements of the top quark mass from data collected by the ATLAS and CMS experiments at $\sqrt{s}=7$ and 8 TeV
CMS, ATLAS Collaborations
arxiv.org/abs/2402.08713

@hey@social.nowicki.io
2024-03-07 06:50:14

@… same here. @… pointed out that some of this traffic is bots looking for a specific websites to exploit them but yesterday most of the keywords were not on the lists. Like variation of “fashion model <name>”

@arXiv_csPL_bot@mastoxiv.page
2024-05-09 06:52:15

Full Version: (De/Re)-Composition of Data-Parallel Computations via Multi-Dimensional Homomorphisms
Ari Rasch
arxiv.org/abs/2405.05118

@arXiv_csIT_bot@mastoxiv.page
2024-04-11 06:50:25

Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel
Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Gro{\ss}
arxiv.org/abs/2404.06952

@arXiv_csCV_bot@mastoxiv.page
2024-04-08 08:30:40

This arxiv.org/abs/2404.01887 has been replaced.
link: scholar.google.com/scholar?q=a

@arXiv_csNE_bot@mastoxiv.page
2024-04-11 07:30:41

Evolving Loss Functions for Specific Image Augmentation Techniques
Brandon Morgan, Dean Hougen
arxiv.org/abs/2404.06633

@tante@tldr.nettime.org
2024-02-28 08:45:36

This article is a perfect summary on why interviewing the stochastic terrorists that create violence against marginalized groups (in this case trans people) centers the aggressors and not the victims and the injustice. Taylor Lorenz got played by LibsOfTikTok and should have known better.
"Furthermore, and in particular: If you are going to use a trans person’s violent death as a narcissistic exercise, and exploit the suffering of a real trans person to raise your own cis profile …

@arXiv_mathAP_bot@mastoxiv.page
2024-04-11 08:36:28

This arxiv.org/abs/2304.11698 has been replaced.
initial toot: mastoxiv.page/@arXiv_mat…

@metacurity@infosec.exchange
2024-04-20 10:23:45

DeFi platform Hedgey Finance hit by $44 million exploit
cointelegraph.com/news/hedgey-

@arXiv_eessAS_bot@mastoxiv.page
2024-03-12 08:42:04

This arxiv.org/abs/2309.04265 has been replaced.
initial toot: mastoxiv.page/@arXiv_ees…

@arXiv_csRO_bot@mastoxiv.page
2024-03-12 06:54:31

SiLVR: Scalable Lidar-Visual Reconstruction with Neural Radiance Fields for Robotic Inspection
Yifu Tao, Yash Bhalgat, Lanke Frank Tarimo Fu, Matias Mattamala, Nived Chebrolu, Maurice Fallon
arxiv.org/abs/2403.06877

@arXiv_mathOC_bot@mastoxiv.page
2024-04-09 08:54:22

This arxiv.org/abs/2102.10647 has been replaced.
link: scholar.google.com/scholar?q=a

@netsec@botsin.space
2024-03-04 16:54:22

Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE thedfirreport.com/2024/03/04/t

@j12t@social.coop
2024-04-21 02:10:18

Somebody is building a low-latency pipeline from #security advisory to attack by means of #AI right now, I'm sure.

@teledyn@mstdn.ca
2024-03-08 16:48:40

Artificial intelligence and illusions of understanding in scientific research | Nature
nature.com/articles/s41586-024

@arXiv_csSE_bot@mastoxiv.page
2024-04-11 06:53:02

Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi
arxiv.org/abs/2404.06856

@mgorny@social.treehouse.systems
2024-03-29 17:49:49

You've probably seen it elsewhere already, but: xz-utils 5.6.0 and 5.6.1 release tarballs contain an elaborate exploit that injects a backdoor into SSH. #Gentoo systems shouldn't be affected since our OpenSSH doesn't link to liblzma — apparently the exploit targets distributions that patch OpenSSH to link with libsystemd, which in turn may link to liblzma. However, it's not clear if the exploits doesn't do anything else, so we've masked the new versions.
lzip is not affected.
openwall.com/lists/oss-securit

@arXiv_hepph_bot@mastoxiv.page
2024-03-11 08:43:07

This arxiv.org/abs/2307.11734 has been replaced.
initial toot: mastoxiv.page/@arXiv_hepp…

@arXiv_csLG_bot@mastoxiv.page
2024-04-10 06:51:50

GO4Align: Group Optimization for Multi-Task Alignment
Jiayi Shen, Cheems Wang, Zehao Xiao, Nanne Van Noord, Marcel Worring
arxiv.org/abs/2404.06486

How significant is Russia’s apparent interception of military talks on Ukraine?
The main benefit to Moscow is to try to publicly exploit the leaks against the German chancellor, who will nevertheless continue to come under western and Ukrainian pressure to donate the Taurus missiles, not least because in the leaked call the German experts say they believe 10-20 might be able to blow up the Kerch Bridge.
“The UK was the first country to provide long-range precision strike missile…

@arXiv_csPL_bot@mastoxiv.page
2024-05-09 06:52:15

Full Version: (De/Re)-Composition of Data-Parallel Computations via Multi-Dimensional Homomorphisms
Ari Rasch
arxiv.org/abs/2405.05118

@arXiv_csDC_bot@mastoxiv.page
2024-05-10 07:33:52

Experience and Analysis of Scalable High-Fidelity Computational Fluid Dynamics on Modular Supercomputing Architectures
Martin Karp, Estela Suarez, Jan H. Meinke, M{\aa}ns I. Andersson, Philipp Schlatter, Stefano Markidis, Niclas Jansson
arxiv.org/abs/2405.05640

@arXiv_csIT_bot@mastoxiv.page
2024-05-09 08:31:56

This arxiv.org/abs/2402.16415 has been replaced.
initial toot: mastoxiv.page/@arXiv_csIT_…

@Techmeme@techhub.social
2024-02-20 10:50:52

Google engineers hacked a Sony PlayStation Portal to run games locally via a PPSSPP emulator in a "software based" exploit; the Portal can only stream PS5 games (Tom Warren/The Verge)
theverge.com/2024/2/20/2407802

@mgorny@social.treehouse.systems
2024-04-06 06:38:29

Honestly, the worst effect of the xz/sshd exploit is the evaporation of trust in #OpenSource.
There's this new prolific contributor. I haven't looked in great detail, but they're seemingly doing great work. All pull requests are nicely annotated as to ease review. Really, everything you could wish for. But what if it's a bad actor trying to quickly build trust?
Then this contributor kindly pings assignee a week after filing the PR. Well, nothing wrong with that. It makes sense. But then, what if it's a bad actor trying to pressure maintainers?
Or perhaps it's just a great, well-organized #Gentoo contributor.

@arXiv_csIR_bot@mastoxiv.page
2024-05-10 06:50:28

Redefining Information Retrieval of Structured Database via Large Language Models
Mingzhu Wang, Yuzhe Zhang, Qihang Zhao, Juanyi Yang, Hong Zhang
arxiv.org/abs/2405.05508

@arXiv_csCV_bot@mastoxiv.page
2024-05-06 08:27:43

This arxiv.org/abs/2404.06202 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCV_…

@arXiv_mathOC_bot@mastoxiv.page
2024-04-08 08:37:57

This arxiv.org/abs/2304.07269 has been replaced.
initial toot: mastoxiv.page/@arXiv_mat…

@arXiv_csCR_bot@mastoxiv.page
2024-04-10 06:47:52

Exploiting CPU Clock Modulation for Covert Communication Channel
Shariful Alam, Jidong Xiao, Nasir U. Eisty
arxiv.org/abs/2404.05823

@netsec@botsin.space
2024-02-24 19:09:22

Go Go XSS Gadgets: Chaining a DOM Clobbering Exploit in the Wild buer.haus/2024/02/23/go-go-xss

@metacurity@infosec.exchange
2024-04-30 13:36:23

Don't miss today's Metacurity for the most critical infosec developments you should know, including
--FCC fines telco giants $200 million for sharing customers' location data without Consent
--UnitedHealth breach began with Citrix flaw exploit,
--Telegram yanks and then restores Ukraine security agency access,
--TikTok ban could extend CapCut video editor,
--Canadian lawmakers in an uproar over Chinese hacker targeting,
--Google blocked 2.28 million Android apps last year,
--Apple leaves EU Safari users exposed to web tracking,
--much more
metacurity.com/p/fcc-fines-tel

@arXiv_csRO_bot@mastoxiv.page
2024-04-08 07:26:07

POMDP-Guided Active Force-Based Search for Robotic Insertion
Chen Wang, Haoxiang Luo, Kun Zhang, Hua Chen, Jia Pan, Wei Zhang
arxiv.org/abs/2404.03943

@arXiv_eessSY_bot@mastoxiv.page
2024-05-09 08:35:10

This arxiv.org/abs/2404.12818 has been replaced.
initial toot: mastoxiv.page/@arXiv_ees…

@arXiv_hepph_bot@mastoxiv.page
2024-04-09 09:05:01

This arxiv.org/abs/2312.05992 has been replaced.
initial toot: mastoxiv.page/@arXiv_hepp…

@metacurity@infosec.exchange
2024-04-30 13:36:23

Don't miss today's Metacurity for the most critical infosec developments you should know, including
--FCC fines telco giants $200 million for sharing customers' location data without Consent
--UnitedHealth breach began with Citrix flaw exploit,
--Telegram yanks and then restores Ukraine security agency access,
--TikTok ban could extend CapCut video editor,
--Canadian lawmakers in an uproar over Chinese hacker targeting,
--Google blocked 2.28 million Android apps last year,
--Apple leaves EU Safari users exposed to web tracking,
--much more
metacurity.com/p/fcc-fines-tel

@arXiv_csCR_bot@mastoxiv.page
2024-05-09 06:48:06

Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren
arxiv.org/abs/2405.04825

@netsec@botsin.space
2024-03-06 19:09:32

CVE-2024-1403: Progress OpenEdge Authentication Bypass Deep-Dive, IOCs, and Exploit horizon3.ai/attack-research/cv

@netsec@botsin.space
2024-03-06 19:09:32

CVE-2024-1403: Progress OpenEdge Authentication Bypass Deep-Dive, IOCs, and Exploit horizon3.ai/attack-research/cv

@arXiv_csCR_bot@mastoxiv.page
2024-04-09 06:48:11

Safeguarding Voice Privacy: Harnessing Near-Ultrasonic Interference To Protect Against Unauthorized Audio Recording
Forrest McKee, David Noever
arxiv.org/abs/2404.04769

@metacurity@infosec.exchange
2024-02-28 15:38:34

Check out today's Metacurity for the major infosec developments you should know, including
--Biden to sign executive order limiting sales of Americans' sensitive data to China, other adversaries
--Global law enforcement partners warn Russians are hacking Ubiquiti EdgeRouters,
--Pharma giant Cencora hit by cyber incident,
--OpenAI claims NYT 'hacked' its products,
--Ransomware newcomer claims hack of Epic Games,
--LockBit gives Fulton County new deadline,
-- Feds warn of ALPHV attacks on healthcare,
--More groups exploit ScreenConnect flaws,
--much more
metacurity.com/p/biden-sign-ex

@netsec@botsin.space
2024-02-23 13:24:24

Code injection or backdoor: A new look at Ivanti's CVE-2021-44529 labs.greynoise.io/grimoire/202