, DM's open. Top percentage Rattata. #cve #infosec #cybersecurity
https://remyhax.xyz/
remyhax.xyz/posts/clanke...
remyhax.xyz/posts/clanke...
I’m trying my hardest to catch up to my own spite of the same problems
I’m trying my hardest to catch up to my own spite of the same problems
Part 1
Part 1
www.cverc.org.cn/head/zhaiyao...
Luckily, Xinhua News Agency has an easily translatable summary here: baijiahao-baidu-com.translate.goog/s?id=1828388...
www.cverc.org.cn/head/zhaiyao...
Luckily, Xinhua News Agency has an easily translatable summary here: baijiahao-baidu-com.translate.goog/s?id=1828388...
A search for that gets us the VERC article:
A search for that gets us the VERC article:
Well that's certainly useful information, let's see if we can find the original report.
Well that's certainly useful information, let's see if we can find the original report.
Or, alternatively, we break out of the echo chamber and take a peek. Here, watch this.
Or, alternatively, we break out of the echo chamber and take a peek. Here, watch this.
www.reuters.com/technology/c...
🧵 I track down the original source Reuters didn't link
www.reuters.com/technology/c...
🧵 I track down the original source Reuters didn't link
We're gonna build custom Bluetooth hardware for $100 (no soldering required), learn well-informed shortcuts for remote identification, oblique strategies for exploitation, and pop some shells.
Wanna learn why DoS is dangerous again? Come join!
We're gonna build custom Bluetooth hardware for $100 (no soldering required), learn well-informed shortcuts for remote identification, oblique strategies for exploitation, and pop some shells.
Wanna learn why DoS is dangerous again? Come join!
Here's how to tie it all together!
Here's how to tie it all together!
Is crying in the corner part of your threat model?
Is crying in the corner part of your threat model?