Hacker News new | past | comments | ask | show | jobs | submit | from login
Lua-Resty-JWT Authentication Bypass (insinuator.net)
1 point by 8organicbits on Oct 12, 2023 | past
Assesment of Visual Voicemail on iPhones (2012) (insinuator.net)
1 point by rubatuga on July 15, 2023 | past
Of Corona, Buggy Audio Drivers and Industrial Espionage (insinuator.net)
1 point by beatrobot on April 27, 2021 | past
Of Corona, Buggy Audio Drivers and Industrial Espionage (insinuator.net)
6 points by todsacerdoti on April 26, 2021 | past
VMware NSX-T MitM Vulnerability (CVE-2020-3993) (insinuator.net)
1 point by wolframio on Nov 27, 2020 | past
An Android 8.0-9.0 Bluetooth Zero-Click RCE (insinuator.net)
139 points by faebi on April 24, 2020 | past | 61 comments
Critical Bluetooth vulnerability in Android (insinuator.net)
504 points by photon-torpedo on Feb 7, 2020 | past | 300 comments
A Brief History of the IPv4 Address Space (insinuator.net)
2 points by wolframio on Sept 1, 2019 | past
IPv6 Security in an IPv4-Only Environment (insinuator.net)
1 point by wolframio on Feb 21, 2019 | past
Local Packet Filtering with IPv6 (2017) (insinuator.net)
1 point by okket on May 8, 2018 | past
TLS in the Enterprise: Is Heartbleed Still a Problem? (insinuator.net)
2 points by wolframio on Feb 19, 2018 | past
Let’s talk about RFC 6980 (insinuator.net)
1 point by wolframio on Dec 1, 2017 | past
RedStar OS Watermarking (insinuator.net)
2 points by rscnt on June 2, 2017 | past
IoT the S Is for Secure – Unknown Administration Interface in Wireless Plug (insinuator.net)
2 points by demouser7 on Nov 21, 2016 | past
How to become part of an iot botnet (insinuator.net)
1 point by Daviey on Oct 2, 2016 | past
Considerations on DMZ Design in 2016, Part 1 (insinuator.net)
2 points by okket on Aug 27, 2016 | past
Ss7MAPer – A SS7 pen testing toolkit (insinuator.net)
3 points by okket on Aug 1, 2016 | past | 1 comment
The Beauty of IPv6 Link-Local Addressing. Not (insinuator.net)
3 points by okket on May 29, 2016 | past
Xen XSA 155: Double fetches in paravirtualized devices (insinuator.net)
1 point by joosters on Dec 20, 2015 | past
Xen XSA 155: Double fetches in paravirtualized devices (insinuator.net)
10 points by fwilhelm on Dec 17, 2015 | past | 1 comment
Some Notes on the “Drop IPv6 Fragments” vs. “This Will Break DNS[SEC]” Debate (insinuator.net)
1 point by liotier on Nov 3, 2015 | past
What Can Happen in the Course of Vulnerability Disclosure (insinuator.net)
38 points by edwinjm on Sept 11, 2015 | past | 6 comments
RedStar OS Watermarking (insinuator.net)
62 points by dlgeek on July 19, 2015 | past | 4 comments
Revisiting Xen’s X86 Emulation: Xen XSA 123 (insinuator.net)
1 point by mukyu on March 12, 2015 | past
IPv6 questions in RFIs/tendering processes (insinuator.net)
1 point by liotier on Nov 28, 2014 | past
A Novel Way of Abusing IPv6 Extension Headers to Evade IPv6 Security Devices (insinuator.net)
2 points by zerny on May 27, 2014 | past
Analysis of Rails XML Parameter Parsing Vulnerability (insinuator.net)
81 points by 10char on Jan 8, 2013 | past | 2 comments
Some Nasty Attacks Against VMware vSphere 5 Based Cloud Infrastructures (insinuator.net)
1 point by meik on May 30, 2012 | past

Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: