(SS7 is a protocol vulnerability that allows attackers to intercept calls, texts, and location data on cellular networks.)
🔗 www.404media.co/dhs-says-chi...
(SS7 is a protocol vulnerability that allows attackers to intercept calls, texts, and location data on cellular networks.)
🔗 www.404media.co/dhs-says-chi...
71K developers. 1,300+ projects. $8.8 trillion in global value. 🌍
📖 Discover more in our 2024 Annual Report: www.linuxfoundation.org/resources/pu...
#OpenSource #LinuxFoundation #Innovation
71K developers. 1,300+ projects. $8.8 trillion in global value. 🌍
📖 Discover more in our 2024 Annual Report: www.linuxfoundation.org/resources/pu...
#OpenSource #LinuxFoundation #Innovation
hubs.la/Q02YpS_C0
hubs.la/Q02YpS_C0
Read it here: hubs.la/Q02ZKrwp0
Read it here: hubs.la/Q02ZKrwp0
TL;DR
Viewing or editing Emacs Lisp code in Emacs can run arbitrary code. The vulnerability stems from unsafe Lisp macro-expansion, which runs unrestricted Emacs Lisp code.
TL;DR
Viewing or editing Emacs Lisp code in Emacs can run arbitrary code. The vulnerability stems from unsafe Lisp macro-expansion, which runs unrestricted Emacs Lisp code.
LF AI & Data, CNCF, and LF Research surveyed 316 professionals to find out. Dive into the full report report: hubs.la/Q02Y_6R60
#GenAI #OpenSource #AI #LFResearch
LF AI & Data, CNCF, and LF Research surveyed 316 professionals to find out. Dive into the full report report: hubs.la/Q02Y_6R60
#GenAI #OpenSource #AI #LFResearch