Used
- [ZBX-25635] Unauthenticated Zabbix frontend takeover when SSO is being used (CVE-2024-36466) – ZABBIX SUPPORT
- GitHub – aws/aws-mysql-odbc: The Amazon Web Services (AWS) ODBC Driver for MySQL allows an application to take advantage of the features of clustered MySQL databases. It is based on and can be used as a drop-in compatible for the MySQL Connector/ODBC driver, and is compatible with all MySQL deployments.
- Russian Military Used Hacked Cameras in Missile Strike on Capital, Alleges Ukraine
- Worldwide Market for Used Smartphones Is Forecast to Surpass 430 Million Units with a Market Value of $109.7 Billion in 2027, According to IDC
- How we used OpenBMC to support AI inference on GPUs around the world
- GitHub – LAC-Japan/IDA_Plugin_AntiDebugSeeker: Automatically identify and extract potential anti-debugging techniques used by malware.
- 3D printing with coffee: Turning used grounds into caffeinated creations | CU Boulder Today | University of Colorado Boulder
- Bob’s Used Books のご紹介 – 新しい現実世界の .NET サンプルアプリケーション | Amazon Web Services ブログ
- One hundred drones now used across IKEA retail for stock inventory | Ingka Group
- Auth0 fixes RCE flaw in JsonWebToken library used by 22,000 projects
- [selectors] The forgiving nature of :has breaks jQuery when used with a complex :has selector ? Issue #7676 ? w3c/csswg-drafts ? GitHub
- Fake Proof-of-Concepts used to lure security professionals
- GitHub – WebKit/WebKit: Home of the WebKit project, the browser engine used by Safari, Mail, App Store and many other applications on macOS, iOS and Linux.
- Google Chrome emergency update fixes new zero-day used in attacks
- Vulnerability mitigated in the third-party Data Connector used in Azure Synapse pipelines and Azure Data Factory (CVE-2022-29972) – Microsoft Security Response Center
- Study Confirms Suspicions That Cat Brains Are Smaller Than They Used to Be
- How We Used eBPF to Build Programmable Packet Filtering in Magic Firewall
- HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks – Microsoft Security Blog
- TikTok LIVE Scams: Stolen Live Footage Used to Earn TikTok Gifts, Promote Scams to Make Money – Blog | Tenable?
- GitHub – erickmu1/Twitter-Algorithmic-Bias: Code for generating results used for submission by HALT AI. Competition information can be found at: https://hackerone.com/twitter-algorithmic-bias?type=team.
- GitHub – mame/sonny-boy-nankai: A “nankai” program used in a Japanese anime television series “Sonny Boy”
- United States Seizes Websites Used by the Iranian Islamic Radio and Television Union and Kata’ib Hizballah | OPA | Department of Justice
- Babel is used by millions, so why are we running out of money? ? Babel
- CWE – CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (4.4)
- Most Chinese Consumers Used Smart Home Devices in COVID-19 – China Internet Watch
- Brave browser first to nix CNAME deception, the sneaky DNS trick used by marketers to duck privacy controls • The Register
- Internet Explorer and Windows zero-day exploits used in Operation PowerFall | Securelist
- Aerosol Filtration Efficiency of Common Fabrics Used in Respiratory Cloth Masks | ACS Nano
- Cow DNA used to secure criminal prosecution
- A Twitter app bug was used to match 17 million phone numbers to user accounts | TechCrunch
- Twitter says an attacker used its API to match usernames to phone numbers | ZDNet
- Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium | Securelist
- Dissecting racial bias in an algorithm used to manage the health of populations | Science
- Volvo Cars to implement blockchain traceability of cobalt used in electric car batteries – Volvo Cars Global Media Newsroom
- Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium | Securelist
- Hong Kong Unrest Drives 4x Surge in Telegram Downloads, Boosts Other Apps Used by Protesters
- microsoft/WSL2-Linux-Kernel: The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)
- ASUS Software Updates Used for Supply Chain Attacks | Symantec Blogs
- Fake EV certificates used in Steam trade phishing attacks | Netcraft
- GitHub – containers/libpod: libpod is a library used to create container pods.
- Radboud University researchers discover security flaws in widely used data storage devices – Radboud University
- Study Reveals the Scutoid, a New Geometric Shape Used by Nature to Pack Cells Efficiently | News Article | Lehigh University
- GitHub – facebookincubator/BOLT: Binary Optimization and Layout Tool – A linux command-line utility used for optimizing performance of binaries
- Artificial Intelligence, NASA Data Used to Discover Exoplanet | NASA
- What router analytics data is collected and how is the data being used by NETGEAR? | Answer | NETGEAR Support
- Blockai: Register your copyright and monitor how it’s used on the web
- WordPress Used as Command and Control Server in 2016 Election Hack
- CVE-2016-4979: HTTPD webserver – X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
- Adobe Flash Zero-day used in targeted attacks – Securelist
- Internet Explorer zero-day exploit used in targeted attacks in South Korea | Symantec Connect Community
- Inside ImageTragick: The Real Payloads Being Used to Hack Websites
- BillGates Malware used in DDoS Attacks – The Akamai Blog
- Oracle Fixes Java Vulnerability Used By Russian Cyberspies – Slashdot
- iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign – iSIGHT Partners
- #2167: openssl-1.0.0-beta5 – fails if used from multiple threads and with SSL_MODE_RELEASE_BUFFERS
- Firefox Zero-Day Used in Child Porn Hunt? — Krebs on Security
- Master Key Android Vulnerability Used to Trojanize Banking App | Security Intelligence Blog | Trend Micro
- Facebook Apps hosted by Heroku used for viral Twitter phishing attack | Netcraft
- New Internet Explorer Zero-Day Used In Watering Hole Attack | Symantec Connect Community