📺 https://peer.adalta.social/w/dpr21TWFNsZeq8D6J8Wiwg 🔗 🇩🇪🇺🇸🇫🇷 🔗 ℹ️
Les Attaques par Injection de Prompts devront être une préoccupation majeure pour les applications basées sur des LLM.
📺 https://peer.adalta.social/w/dpr21TWFNsZeq8D6J8Wiwg 🔗 🇩🇪🇺🇸🇫🇷 🔗 ℹ️
Les Attaques par Injection de Prompts devront être une préoccupation majeure pour les applications basées sur des LLM.
All kinds of tech nerd, software engineer and consultant, startup founder. From Assembly to Javascript. Always bet on the web! I love text. I hate pooptoots, memes or any other viral bs. Header image by https://unsplash.com/de/@dth_knight Some fedi/ipfs/decentralisation things I've done in the past:
I couldn’t find a list of #Linux #kernel versions that include a patch for #copyfail, so I dug into the commit log and made one. Make sure you’re using at least the following version of your branch to mitigate against copyfail:
See https://copy.fail for more info about the #exploit.
#privilegeescalation #vulnerability #cryptography #linuxadmin #sysadmin
Enabling Good Cybersecurity for Everyone: Automated cybersecurity tools, learning and expert guidance for individuals and companies of all sizes. Because cybersecurity shouldn't be an enterprise feature. Sometimes a bot, sometimes not.
Copy Fail: Linux Kernel Flaw Grants Root Access On All Major Distributions
A Linux kernel vulnerability called “Copy Fail” (CVE-2026-31431) allows unprivileged local users to gain root privileges with 100% reliability by corrupting the shared page cache. The flaw affects nearly all Linux distributions since 2017 and enables container escapes because the memory corruption does not modify files on disk.
If you run Linux servers, especially shared environments like Kubernetes clusters, CI/CD runners, or multi-tenant hosts, patch your kernel immediately to a version that includes the fix (mainline commit a664bf3d603d) for CVE-2026-31431. If you can’t patch right away, disable the vulnerable module by running echo “install algif_aead /bin/false” > /etc/modprobe.d/disable-algif.conf followed by rmmod algif_aead, and for untrusted code environments block AF_ALG socket creation via seccomp as a long-term safeguard. #cybersecurity #infosec #advisory #vulnerability https://beyondmachines.net/event_details/copy-fail-linux-kernel-flaw-grants-root-access-on-all-major-distributions-w-l-v-0-c/gD2P6Ple2L
Curated intelligence for the refined hacker. We filter the noise to bring you tradecraft, zero-days, and techniques that matter.
Always questioning. Latest news focused on #cybersecurity, #privacy, #Linux, #Apple, #Microsoft, #Google, #AI, and the tech industry in general. Toxicity is not tolerated. I follow like interests. Check your facts. - FactCheck.org https://www.factcheck.org/ - Reuters Fact Check https://www.reuters.com/fact-check/ - AP Fact Check https://apnews.com/ap-fact-check - Snopes https://www.snopes.com/ - Politifact https://www.politifact.com/ NordVPN Link Checker: https://nordvpn.com/link-checker/ Project 2025 Tracker https://www.project2025.observer/
Unofficial Hacker News Bot, posting Top 10 stories.
I am a news BOT created by IndieAuthors.Social to help inform indie authors and the readers that love them. If you write author-related news or blogs made available via RSS/ATOM feeds and would like me to share your posts, toot my human benefactor @indieauthors.social@admin to inquire further.
Mastodon account of the most reliable cybersecurity news platforms bringing exclusive dark web, tech, and hacking news. Contact: admin@hackread.com.
Ik schrijf altijd alles tegelijk en nu op zoek naar enthousiaste vragen en reacties om me aan te vullen waar het kan. TAO in de materiële wereld TAO in de ideeënwereld #gent #9000
📺 https://peer.adalta.social/w/qce11wDNyBC78tLqnRKmds 🔗 🇩🇪🇺🇸🇫🇷
La configuration d’un système NetBSD en lecture seule atténue un point de vulnérabilité critique souvent négligé : la corruption du système de fichiers sur des supports de stockage peu fiables.
📺 https://peer.adalta.social/w/nQCwqAv8Gf7ahWVFEfdz2R 🔗 🇩🇪🇺🇸🇫🇷
A practical guide to hardening embedded systems by eliminating file system write vulnerabilities through a memory-backed root configuration.
📺 https://peer.adalta.social/w/bG7GEPHbVSBzsFmeoM1LAD 🔗 🇩🇪🇺🇸🇫🇷
Die Absicherung des Dateisystems als kritische Maßnahme gegen Datenkorruption und Ausfälle
High severity authorization #vulnerability in Keycloak:
📺 https://peer.adalta.social/w/ha7u8osqJ9djsMHeNLvuaH 🔗 🇩🇪🇺🇸🇫🇷
Une faille de dépassement de tampon accessible à distance compromet l’intégrité des réseaux, avec un exploit public disponible.
📺 https://peer.adalta.social/w/kpVddxKp2FBwhdvJ28fzU2 🔗 🇩🇪🇺🇸🇫🇷
A publicly released exploit for a critical buffer overflow in Tenda routers demands immediate action from network defenders.
📺 https://peer.adalta.social/w/jG6JrBKpEnD9cTemxKWzzY 🔗 🇩🇪🇺🇸🇫🇷
Ein veröffentlichter Proof-of-Concept-Exploit für einen Remote-Buffer-Overflow erhöht das Risiko für ungepatchte Netzwerke erheblich.
Infosec consultant at REVƎЯSEC https://reversec.com - Coding, Research + various other interests
📺 https://peer.adalta.social/w/tuYBhErBwiJHz3GM2eKdaS 🔗 🇩🇪🇺🇸🇫🇷
Une faille de sécurité majeure force une mise à jour obligatoire et immédiate pour tous les déploiements.
Long time Linux user (since the late 90s), found a home with Arch for the last 6yrs. Lover of extreme and brutal writing and music. Huge fan of W.S.Burroughs, probably the greatest American writer of the 20th Century.