-
Hi @Lamdom97,
thanks for publishing the source code.
Unter which license is it placed?
And who or which organisation holds the exclusive exploitation rights (the German equivalent of "copyright")…
-
Hi!
It seems like currently there is no way to read flash from the device (this feature is not available even in their own tool).
However, I really need this feature for one of the projects I'm worki…
-
### **SUMMARY**
The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory to warn network defenders about exploitation of CVE-2023-3519, an unauthenticate…
-
A new hacking campaign exploits Sunlogin flaws to deploy the Sliver post-exploitation toolkit and launch Windows Bring Your Own Vulnerable Driver (BYOVD) attacks to disable security software. \[...\…
-
### SUMMARY
The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) are releasing this joint Cybersecurity Advisory (CSA) in response …
-
**Submitting author:** @AlexanderJuestel (Alexander Jüstel)
**Repository:** https://github.com/cgre-aachen/gemgis_data
**Branch with paper.md** (empty if default branch):
**Version:** 1.0.0
**Editor…
-
The U.S. government agency in charge of improving the nation’s cybersecurity posture is ordering all federal civilian agencies to take new measures to restrict access to Internet-exposed networking …
-
### Bug description
On a fresh install on Windows 10, I run into the following error when doing `quarto check` (or when trying to preview):
```
ERROR: NotFound: The system cannot find the file sp…
-
Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation activities.
The findings come from AhnLab Sec…
-
### SUMMARY
The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) are releasing this joint Cybersecurity Advisory (CSA) in response …