Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)K
帖子
0
评论
15
加入于
3 yr. ago

  • So, will the AV software then scan that +:\ drive or not? 🤔

  • I wonder what must happen that we as a society start to make companies responsible for such fails.

  • I like this comment on that page, haven’t heard about it before: «Was done..in Stockholm a few years back. Someone copied the plates of the CEO of the company operating a toll road in the city and posted it online. Folks pasted it over their own plates and used the toll road all day. The ALPR dutifully generated an humongous bill…»

  • And which has constantly lied to you and ignored what you told it to not do. Must be that quality we were told about…

  • «PQC...isn't mathematics or engineering, it's augury: 'A great machine shall arise, and it will cast aside all existing cryptography, there shall be Famine, Plague, War, and a long arable field.'»

    🤭

  • Yes. And you will have a good chance that the EDR wont flag the extractor since its not suspicious code per se.

  • «When they loaded this URL, the server responded with a Java heap dump, which is a roughly 150-MB file containing a snapshot of the server’s memory at the moment the URL was loaded.»

    Comedy gold, the whole article…

  • News or not. I like the fact that the pot is calling the kettle black…

  • A tad late (the original story), but now there is an opinion piece on this topic now: https://www.theregister.com/2025/03/24/microsoft_opinion/

    I like the part with "This a post-literate era, and we should expect the next demand for bughunters to express proof-of-concept as a TikTok dance short."

  • OH: «by sending a malicious DNS packet to the target device», 👌🤭

  • I lost count. How many vulns this year already?

  • 🤭