What is this?
This mirrors the Hacker News front page. Click on tags to filter / exclude. You can combine multiple tags.
Get these tags inside Hacker News itself with these open-source browser extensions for Chrome and Firefox
histre is a power tool for your knowledge. This is a demo of its auto-tagging feature. Learn about its other features here
Level-10 vuln lurking in Redis source code for 13 years could allow RCE
• www.theregister.com
Arbitrary code execution in Unity Runtime
• flatt.tech
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability
• www.securityweek.com
New Physical Attacks on Intel SGX and AMD SEV-SNP
• arstechnica.com
Is IP fragmentation still considered vulnerable?
• blog.apnic.net
Supermicro server motherboards can be infected with unremovable malware
• arstechnica.com
Exploit allows for takeover of fleets of Unitree robots
• spectrum.ieee.org
As many as 2M Cisco devices affected by actively exploited 0-day
• arstechnica.com
Is This Bad? This Feels Bad. (Fortra GoAnywhere CVE-2025-10035)
• labs.watchtowr.com
Supermicro server motherboards can be infected with unremovable malware
• arstechnica.com
NT OS Kernel Information Disclosure Vulnerability
• www.crowdfense.com
Insufficiently sanitized data allows unauthenticated access to FreePBX Admin
• labs.watchtowr.com
Heap-based buffer overflow in Kernel Streaming
• www.crowdfense.com
Kernel-hack-drill and exploiting CVE-2024-50264 in the Linux kernel
• a13xp0p0v.github.io
Weaponizing image scaling against production AI systems
• blog.trailofbits.com
Major password managers can leak logins in clickjacking attacks
• www.bleepingcomputer.com
Marshal madness: A brief history of Ruby deserialization exploits
• blog.trailofbits.com
How we exploited CodeRabbit: From simple PR to RCE and write access on 1M repos
• research.kudelskisecurity.com