In a New York Times article released on January 6, 2021, JetBrains and their Continuous Integration / Continuous Deployment (CI/C) application Teamcity were confirmed to be used by recently hacked software company SolarWinds.
Using Pastebin unique visitor counts for tracking, over 6,500 victims are estimated to be affected after detection of this malware in December. These numbers may be off and definatly will grow in the coming days. Called ElectroRAT by Intezer, the RAT is written from ground-up in Golang and designed to target multiple operating systems such as Windows, Linux, and macOS. https://thehackernews.com/2021/01/warning-cross-platform-electrorat.html “Cybersecurity
Preventing SQL injections is a popular topic. #1 on stackoverflow (for php) and also listed on the OWASP top 10. So what is an SQL Injection? The first part “SQL” refers to Sequential Query Language which is used in querying databases like Mysql, Postgres SQL or mariaDB. The term is meant to be used as a generalization for any database
Believe it or not, Twitter is not the only way to share your thoughts on the internet. Well, in light of recent behavior we’ve come to understand that Twitter is the adult and we all are the teenagers living under their roof. But just like a teenager, there are ways to get away from these rules. Enter Mastadon. No, not
WINDOWS SERVER VULNERABILITY REQUIRES IMMEDIATE ATTENTION.This has been posted on /r/sysadmin on Reddit: CVE-2020-1472 Netlogon Elevation of Privilege Vulnerability from sysadmin Twitter post explaining it: https://twitter.com/RyanLNewington/status/129344415164462694… Blog post explaining it: https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnera… POC: https://infinitelogins.com/2020/09/15/abusing-cve-2020-1472-…
BBC News is reporting: Dozens of Android phone owners are reporting on social media that a picture featuring a lake, a cloudy sunset and a green shoreline is crashing their handsets when used as wallpaper. How could such a serene image cause a phone to crash? Basically, its too much for the phone to handle. The developers never thought about
This is a great article about the mentality that allows you to use VIM even when it is “hard” There is a computer program called Vim, based on software created in the 1970s. It is famously difficult. Computer programmers have endless jokes about how much of a challenge it is just to exit the program. It is also ubiquitous. If you
Man, I loved this game and this video brings back all the feels! Thank you Codex! If you want to support the development of this series, and check out the extended interview with Dave Taylor, consider subscribing on Patreon! https://www.patreon.com/codexshow The first episode of Codex takes a look at the story behind DOOM’s cheat codes, and the person responsible for
I use ‘grep’ on a daily basis and completely take for granted the code that is behind it. Here is the amazing explanation of what/how ‘grep’ is.
There are many great arguments here posted hee brings up some great ideas. what do you think? 100% via (decentralized tv) https://decentralized.tv/politicians-concerned-crypto-can-influence-elections-should-focus-on-firing-politicians-instead/