Used
- Russian Military Used Hacked Cameras in Missile Strike on Capital, Alleges Ukraine
- Worldwide Market for Used Smartphones Is Forecast to Surpass 430 Million Units with a Market Value of $109.7 Billion in 2027, According to IDC
- How we used OpenBMC to support AI inference on GPUs around the world
- GitHub – LAC-Japan/IDA_Plugin_AntiDebugSeeker: Automatically identify and extract potential anti-debugging techniques used by malware.
- 3D printing with coffee: Turning used grounds into caffeinated creations | CU Boulder Today | University of Colorado Boulder
- Bob’s Used Books のご紹介 – 新しい現実世界の .NET サンプルアプリケーション | Amazon Web Services ブログ
- One hundred drones now used across IKEA retail for stock inventory | Ingka Group
- Auth0 fixes RCE flaw in JsonWebToken library used by 22,000 projects
- [selectors] The forgiving nature of :has breaks jQuery when used with a complex :has selector ? Issue #7676 ? w3c/csswg-drafts ? GitHub
- Fake Proof-of-Concepts used to lure security professionals
- GitHub – WebKit/WebKit: Home of the WebKit project, the browser engine used by Safari, Mail, App Store and many other applications on macOS, iOS and Linux.
- Google Chrome emergency update fixes new zero-day used in attacks
- Vulnerability mitigated in the third-party Data Connector used in Azure Synapse pipelines and Azure Data Factory (CVE-2022-29972) – Microsoft Security Response Center
- Study Confirms Suspicions That Cat Brains Are Smaller Than They Used to Be
- How We Used eBPF to Build Programmable Packet Filtering in Magic Firewall
- HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks – Microsoft Security Blog
- TikTok LIVE Scams: Stolen Live Footage Used to Earn TikTok Gifts, Promote Scams to Make Money – Blog | Tenable?
- GitHub – erickmu1/Twitter-Algorithmic-Bias: Code for generating results used for submission by HALT AI. Competition information can be found at: https://hackerone.com/twitter-algorithmic-bias?type=team.
- GitHub – mame/sonny-boy-nankai: A “nankai” program used in a Japanese anime television series “Sonny Boy”
- United States Seizes Websites Used by the Iranian Islamic Radio and Television Union and Kata’ib Hizballah | OPA | Department of Justice
- Babel is used by millions, so why are we running out of money? ? Babel
- CWE – CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (4.4)
- Most Chinese Consumers Used Smart Home Devices in COVID-19 – China Internet Watch
- Brave browser first to nix CNAME deception, the sneaky DNS trick used by marketers to duck privacy controls • The Register
- Internet Explorer and Windows zero-day exploits used in Operation PowerFall | Securelist
- Aerosol Filtration Efficiency of Common Fabrics Used in Respiratory Cloth Masks | ACS Nano
- Cow DNA used to secure criminal prosecution
- A Twitter app bug was used to match 17 million phone numbers to user accounts | TechCrunch
- Twitter says an attacker used its API to match usernames to phone numbers | ZDNet
- Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium | Securelist
- Dissecting racial bias in an algorithm used to manage the health of populations | Science
- Volvo Cars to implement blockchain traceability of cobalt used in electric car batteries – Volvo Cars Global Media Newsroom
- Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium | Securelist
- Hong Kong Unrest Drives 4x Surge in Telegram Downloads, Boosts Other Apps Used by Protesters
- microsoft/WSL2-Linux-Kernel: The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)
- ASUS Software Updates Used for Supply Chain Attacks | Symantec Blogs
- Fake EV certificates used in Steam trade phishing attacks | Netcraft
- GitHub – containers/libpod: libpod is a library used to create container pods.
- Radboud University researchers discover security flaws in widely used data storage devices – Radboud University
- Study Reveals the Scutoid, a New Geometric Shape Used by Nature to Pack Cells Efficiently | News Article | Lehigh University
- GitHub – facebookincubator/BOLT: Binary Optimization and Layout Tool – A linux command-line utility used for optimizing performance of binaries
- Artificial Intelligence, NASA Data Used to Discover Exoplanet | NASA
- What router analytics data is collected and how is the data being used by NETGEAR? | Answer | NETGEAR Support
- Blockai: Register your copyright and monitor how it’s used on the web
- WordPress Used as Command and Control Server in 2016 Election Hack
- CVE-2016-4979: HTTPD webserver – X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
- Adobe Flash Zero-day used in targeted attacks – Securelist
- Internet Explorer zero-day exploit used in targeted attacks in South Korea | Symantec Connect Community
- Inside ImageTragick: The Real Payloads Being Used to Hack Websites
- BillGates Malware used in DDoS Attacks – The Akamai Blog
- Oracle Fixes Java Vulnerability Used By Russian Cyberspies – Slashdot
- iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign – iSIGHT Partners
- #2167: openssl-1.0.0-beta5 – fails if used from multiple threads and with SSL_MODE_RELEASE_BUFFERS
- Firefox Zero-Day Used in Child Porn Hunt? — Krebs on Security
- Master Key Android Vulnerability Used to Trojanize Banking App | Security Intelligence Blog | Trend Micro
- Facebook Apps hosted by Heroku used for viral Twitter phishing attack | Netcraft
- New Internet Explorer Zero-Day Used In Watering Hole Attack | Symantec Connect Community