| | Lua-Resty-JWT Authentication Bypass (insinuator.net) |
|
1 point by 8organicbits on Oct 12, 2023 | past
|
| | Assesment of Visual Voicemail on iPhones (2012) (insinuator.net) |
|
1 point by rubatuga on July 15, 2023 | past
|
| | Of Corona, Buggy Audio Drivers and Industrial Espionage (insinuator.net) |
|
1 point by beatrobot on April 27, 2021 | past
|
| | Of Corona, Buggy Audio Drivers and Industrial Espionage (insinuator.net) |
|
6 points by todsacerdoti on April 26, 2021 | past
|
| | VMware NSX-T MitM Vulnerability (CVE-2020-3993) (insinuator.net) |
|
1 point by wolframio on Nov 27, 2020 | past
|
| | An Android 8.0-9.0 Bluetooth Zero-Click RCE (insinuator.net) |
|
139 points by faebi on April 24, 2020 | past | 61 comments
|
| | Critical Bluetooth vulnerability in Android (insinuator.net) |
|
504 points by photon-torpedo on Feb 7, 2020 | past | 300 comments
|
| | A Brief History of the IPv4 Address Space (insinuator.net) |
|
2 points by wolframio on Sept 1, 2019 | past
|
| | IPv6 Security in an IPv4-Only Environment (insinuator.net) |
|
1 point by wolframio on Feb 21, 2019 | past
|
| | Local Packet Filtering with IPv6 (2017) (insinuator.net) |
|
1 point by okket on May 8, 2018 | past
|
| | TLS in the Enterprise: Is Heartbleed Still a Problem? (insinuator.net) |
|
2 points by wolframio on Feb 19, 2018 | past
|
| | Let’s talk about RFC 6980 (insinuator.net) |
|
1 point by wolframio on Dec 1, 2017 | past
|
| | RedStar OS Watermarking (insinuator.net) |
|
2 points by rscnt on June 2, 2017 | past
|
| | IoT the S Is for Secure – Unknown Administration Interface in Wireless Plug (insinuator.net) |
|
2 points by demouser7 on Nov 21, 2016 | past
|
| | How to become part of an iot botnet (insinuator.net) |
|
1 point by Daviey on Oct 2, 2016 | past
|
| | Considerations on DMZ Design in 2016, Part 1 (insinuator.net) |
|
2 points by okket on Aug 27, 2016 | past
|
| | Ss7MAPer – A SS7 pen testing toolkit (insinuator.net) |
|
3 points by okket on Aug 1, 2016 | past | 1 comment
|
| | The Beauty of IPv6 Link-Local Addressing. Not (insinuator.net) |
|
3 points by okket on May 29, 2016 | past
|
| | Xen XSA 155: Double fetches in paravirtualized devices (insinuator.net) |
|
1 point by joosters on Dec 20, 2015 | past
|
| | Xen XSA 155: Double fetches in paravirtualized devices (insinuator.net) |
|
10 points by fwilhelm on Dec 17, 2015 | past | 1 comment
|
| | Some Notes on the “Drop IPv6 Fragments” vs. “This Will Break DNS[SEC]” Debate (insinuator.net) |
|
1 point by liotier on Nov 3, 2015 | past
|
| | What Can Happen in the Course of Vulnerability Disclosure (insinuator.net) |
|
38 points by edwinjm on Sept 11, 2015 | past | 6 comments
|
| | RedStar OS Watermarking (insinuator.net) |
|
62 points by dlgeek on July 19, 2015 | past | 4 comments
|
| | Revisiting Xen’s X86 Emulation: Xen XSA 123 (insinuator.net) |
|
1 point by mukyu on March 12, 2015 | past
|
| | IPv6 questions in RFIs/tendering processes (insinuator.net) |
|
1 point by liotier on Nov 28, 2014 | past
|
| | A Novel Way of Abusing IPv6 Extension Headers to Evade IPv6 Security Devices (insinuator.net) |
|
2 points by zerny on May 27, 2014 | past
|
| | Analysis of Rails XML Parameter Parsing Vulnerability (insinuator.net) |
|
81 points by 10char on Jan 8, 2013 | past | 2 comments
|
| | Some Nasty Attacks Against VMware vSphere 5 Based Cloud Infrastructures (insinuator.net) |
|
1 point by meik on May 30, 2012 | past
|