1He Tracked Everything About Himself in 2024: Here's the Data (opens in new tab)(lorenzomodolo.com)3wolframio1y ago0
2Open to Exploitation: The Security Risks of Unauthenticated Pager Networks (opens in new tab)(telescope.ac)2wolframio1y ago0
3Teardown: Keyless car theft tool hidden inside a JBL Bluetooth speaker case (opens in new tab)(kentindell.github.io)3wolframio1y ago1
4Decoding DME aircraft radio navigation system with the LimeSDR (opens in new tab)(destevez.net)117wolframio1y ago38
8US Government Cyber Operations Hacking Groups Poster (opens in new tab)(xorl.wordpress.com)1wolframio4y ago0
9No Python interpreter? this simple RAT installs its own copy (opens in new tab)(isc.sans.edu)76wolframio4y ago61
10VMware NSX-T MitM Vulnerability (CVE-2020-3993) (opens in new tab)(insinuator.net)1wolframio5y ago0
11Financial Data Risk Report Reveals Every Employee Can Access 11M Files (opens in new tab)(varonis.com)1wolframio5y ago0
12Testing MAYHEM the open source RF hacking Portapack firmware (opens in new tab)(telescope.ac)3wolframio5y ago1
13Hacking a $20 toy drone to run open-source firmware and gain new flight modes (opens in new tab)(dronegarageblog.wordpress.com)5wolframio5y ago1
14How to deal with Google and YouTube aggressive sign in popups (opens in new tab)(ghacks.net)3wolframio5y ago0
15I Hacked Facebook Again Unauthenticated RCE on MobileIron MDM (opens in new tab)(blog.orange.tw)2wolframio5y ago0