med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

365
active users

#zeroday

3 posts2 participants2 posts today
nemo™ 🇺🇦<p>Google has released an emergency Chrome update to patch CVE-2025-6558, a high-severity sandbox escape flaw actively exploited in the wild 🚨. The vulnerability affects ANGLE/GPU components and could let attackers break out of Chrome’s security sandbox via a malicious webpage 💻. This impacts all major platforms and Chrome derivatives—update immediately! 🔗 <a href="https://cyberinsider.com/google-patches-actively-exploited-sandbox-escape-flaw-in-chrome/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/google-patche</span><span class="invisible">s-actively-exploited-sandbox-escape-flaw-in-chrome/</span></a> <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mas.to/tags/UpdateNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UpdateNow</span></a> <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
nemo™ 🇺🇦<p>Achtung: Eine kritische Zero-Day-Lücke in Chrome ermöglicht Hackern das Ausbrechen aus der Sandbox! 🚨 Nutzer sollten jetzt sofort updaten, um sich vor Angriffen zu schützen. Mehr Infos dazu im Artikel von golem: <a href="https://www.golem.de/news/google-warnt-zero-day-luecke-in-chrome-laesst-hacker-aus-sandbox-ausbrechen-2507-198152.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/google-warnt-zer</span><span class="invisible">o-day-luecke-in-chrome-laesst-hacker-aus-sandbox-ausbrechen-2507-198152.html</span></a> 🔒 <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mas.to/tags/UpdateJetzt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UpdateJetzt</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p><a href="https://kolektiva.social/tags/Japan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Japan</span></a>-based <a href="https://kolektiva.social/tags/NipponSteel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NipponSteel</span></a> Solutions on Tuesday disclosed a data breach that resulted from the exploitation of a zero-day vulnerability.<br><a href="https://kolektiva.social/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://kolektiva.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <br><a href="https://kolektiva.social/tags/Zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zeroday</span></a> <a href="https://www.securityweek.com/nippon-steel-subsidiary-blames-data-breach-on-zero-day-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/nippon-steel-</span><span class="invisible">subsidiary-blames-data-breach-on-zero-day-attack/</span></a></p>
nemo™ 🇺🇦<p>🚨 Google patches a critical V8 vulnerability in Chrome that's being actively exploited! Users urged to update ASAP to stay protected. The flaw (CVE-2025-6554) allows attackers to run code via malicious sites. 🔒💻 <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a> </p><p>Read more: <a href="https://cyberinsider.com/google-patches-actively-exploited-v8-vulnerability-in-chrome/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/google-patche</span><span class="invisible">s-actively-exploited-v8-vulnerability-in-chrome/</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a>-linked group <a href="https://infosec.exchange/tags/Houken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Houken</span></a> hit French organizations using zero-days<br><a href="https://securityaffairs.com/179602/apt/china-linked-group-houken-hit-french-organizations-using-zero-days.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179602/apt</span><span class="invisible">/china-linked-group-houken-hit-french-organizations-using-zero-days.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a>: <a href="https://social.tchncs.de/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a>-Lücke macht Millionen Kopfhörer zu Abhörstationen | Security <a href="https://www.heise.de/news/Zero-Day-Bluetooth-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zero-Day-Bluetoo</span><span class="invisible">th-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html</span></a> <a href="https://social.tchncs.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://social.tchncs.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Überwachung</span></a></p>
Scripter :verified_flashing:<p>Zero-Day: Bluetooth-Lücke macht Millionen Kopfhörer zu Abhörstationen | heise online<br><a href="https://www.heise.de/news/Zero-Day-Bluetooth-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zero-Day-Bluetoo</span><span class="invisible">th-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html</span></a> <a href="https://social.tchncs.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.tchncs.de/tags/BluetoothKopfh%C3%B6rer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BluetoothKopfhörer</span></a> <a href="https://social.tchncs.de/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a></p>
CryptGoat<p><a href="https://fedifreu.de/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> was a mistake: Millions of Bluetooth headphones can potentially be turned in eavesdropping devices. Best-seller <a href="https://fedifreu.de/tags/Sony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sony</span></a> and <a href="https://fedifreu.de/tags/Bose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bose</span></a> <a href="https://fedifreu.de/tags/headphones" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>headphones</span></a> are affected by at least some of the disclosed flaws among many others. The true dimension of these flaws is yet unknown as the the vulnerable component is very widely in use under different names.</p><p><a href="https://www.heise.de/en/news/Zero-day-Bluetooth-gap-turns-millions-of-headphones-into-listening-stations-10460704.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Zero-day-Blue</span><span class="invisible">tooth-gap-turns-millions-of-headphones-into-listening-stations-10460704.html</span></a></p><p>Disclosure of the vulnerabilities: <a href="https://insinuator.net/2025/06/airoha-bluetooth-security-vulnerabilities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">insinuator.net/2025/06/airoha-</span><span class="invisible">bluetooth-security-vulnerabilities/</span></a></p><p>No updates or official statements available yet. ☠️ </p><p><a href="https://fedifreu.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://fedifreu.de/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://fedifreu.de/tags/Audio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Audio</span></a> <a href="https://fedifreu.de/tags/Airoha" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Airoha</span></a> <a href="https://fedifreu.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a></p>
nemo™ 🇺🇦<p>Millionen Bluetooth-Kopfhörer von Sony, JBL, Bose &amp; Co. sind durch eine Zero-Day-Lücke angreifbar! 😱 Hacker können Gespräche abhören &amp; Geräte übernehmen. Updates fehlen noch – betroffen sind viele beliebte Modelle. Mehr Infos im Artikel: <a href="https://www.heise.de/news/Zero-Day-Bluetooth-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zero-Day-Bluetoo</span><span class="invisible">th-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html</span></a> <a href="https://mas.to/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> <a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/Kopfh%C3%B6rer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kopfhörer</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a> </p><p>Kurzlink: <a href="https://heise.de/-10457857" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-10457857</span><span class="invisible"></span></a></p>
heise online<p>Gefahr in der Luft: 🎧🚨 Forscher haben eine kritische Sicherheitslücke aufgedeckt, die Millionen drahtlose Kopfhörer in potenzielle Abhörgeräte verwandeln könnte.</p><p>Zum Artikel: <a href="https://heise.de/-10457857?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">heise.de/-10457857?wt_mc=sm.re</span><span class="invisible">d.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/BluetoothSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BluetoothSicherheit</span></a> <a href="https://social.heise.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://social.heise.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a></p>
Nicolas MOUART-DAVID<p>Frank stone wall builders have a problem, I repeat, stone wall builders have a ..</p><p>Did you know? </p><p>Social engineering is the number One attack vector in Computer Science, because the problem is always between the keyboard and the chair.</p><p><a href="https://mastodon.social/tags/Enisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Enisa</span></a> <br><a href="https://mastodon.social/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/Whistleblower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whistleblower</span></a> <a href="https://mastodon.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mastodon.social/tags/Patch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patch</span></a> <a href="https://mastodon.social/tags/SecretSignsKlub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecretSignsKlub</span></a> <a href="https://mastodon.social/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a></p>
Christian Pietsch<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>heiseonline</span></a></span> Obwohl diese Überwachungsmaßnahmen nur zielgerichtet eingesetzt werden sollen, schaden sie uns allen – auch in Deutschland und anderen Ländern. Denn damit der Bundestrojaner im Bedarfsfall funktioniert, müssen Sicherheitslücken offengehalten (<a href="https://fedifreu.de/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a>) oder eingeschmuggelt (<a href="https://fedifreu.de/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a>) werden.</p><p>Dadurch wird die gesamte globale IT-Infrastruktur unsicherer: Kriminelle und feindliche Geheimdienste können diese Hintertüren genauso nutzen wie die eigenen Geheimdienste.</p><p>Wäre schön, wenn Heise diese Zusammenhänge im Artikel erläutern würde.</p><p><a href="https://fedifreu.de/tags/Bundestrojaner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bundestrojaner</span></a> <a href="https://fedifreu.de/tags/Staatstrojaner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Staatstrojaner</span></a> <a href="https://fedifreu.de/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> <a href="https://fedifreu.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://fedifreu.de/tags/zerodays" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerodays</span></a> <a href="https://fedifreu.de/tags/Hintert%C3%BCr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hintertür</span></a></p>
nemo™ 🇺🇦<p>🚨 Team46 APT exploits a Chrome zero-day to deliver Trinper malware! Users urged to update browsers ASAP. Cyber threats are evolving—stay alert! 🔒🛡️ <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mas.to/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> Read more: <a href="https://cyberinsider.com/chrome-zero-day-exploited-by-team46-apt-to-deliver-trinper-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/chrome-zero-d</span><span class="invisible">ay-exploited-by-team46-apt-to-deliver-trinper-malware/</span></a><br><a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
Marcus "MajorLinux" Summers<p>I'm not saying that Zionists are evil, but...</p><p>No, wait! I am! I am saying Zionists are evil!</p><p>Apple quietly fixed an iPhone zero-day flaw used against journalists - 9to5Mac </p><p><a href="https://9to5mac.com/2025/06/12/apple-confirms-it-quietly-fixed-an-iphone-zero-day-flaw-used-against-journalists/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">9to5mac.com/2025/06/12/apple-c</span><span class="invisible">onfirms-it-quietly-fixed-an-iphone-zero-day-flaw-used-against-journalists/</span></a></p><p><a href="https://toot.majorshouse.com/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://toot.majorshouse.com/tags/iPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPhone</span></a> <a href="https://toot.majorshouse.com/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://toot.majorshouse.com/tags/Flaw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flaw</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://toot.majorshouse.com/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> Tech</p>
AAKL<p>Trend Micro: The June 2025 Security Update Review <a href="https://www.zerodayinitiative.com/blog/2025/6/10/the-june-2025-security-update-review" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zerodayinitiative.com/blog/202</span><span class="invisible">5/6/10/the-june-2025-security-update-review</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@TheDustinChilds" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>TheDustinChilds</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
spmatich vk3spm :blobcoffee:<p><span class="h-card" translate="no"><a href="https://mas.to/@deepmud" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>deepmud</span></a></span> similar in effect to “what is the sound of one hand clapping”. Such questions are like an <a href="https://ioc.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> that can bypass our mental instruction cache and execute a <a href="https://ioc.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> on our prefrontal cortex, and I for one am here for it. Happy to have my mind stopped by art.</p>
nemo™ 🇺🇦<p>🚨 Billions of Chrome &amp; Chromium users are at risk from a new zero-day vulnerability (CVE-2025-4664) that can leak sensitive data! Experts urge everyone to update browsers ASAP &amp; use extra security tools. Stay safe online! 🔒🌐<br>More info 👉 <a href="https://www.techradar.com/pro/security/billions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/bil</span><span class="invisible">lions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe</span></a><br><a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
Alan E. Yue (He/Him)<p>It's a beautiful (Zero)day in the neighborhood!</p><p><a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/updatenowwarning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>updatenowwarning</span></a> </p><p><a href="https://thehackernews.com/2025/06/new-chrome-zero-day-actively-exploited.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/06/new-</span><span class="invisible">chrome-zero-day-actively-exploited.html</span></a></p>
Miguel Afonso Caetano<p>"My experiment harness executes this N times (N=100 for this particular experiment) and saves the results. It’s worth noting, if you rerun this you may not get identical results to me as between running the original experiment and writing this blog post I had removed the file containing the code to be analysed, and had to regenerate it. I believe it is effectively identical, but have not re-run the experiment.</p><p>o3 finds the kerberos authentication vulnerability in the benchmark in 8 of the 100 runs. In another 66 of the runs o3 concludes there is no bug present in the code (false negatives), and the remaining 28 reports are false positives. For comparison, Claude Sonnet 3.7 finds it 3 out of 100 runs and Claude Sonnet 3.5 does not find it in 100 runs. So on this benchmark at least we have a 2x-3x improvement in o3 over Claude Sonnet 3.7.</p><p>For the curious, I have uploaded a sample report from o3 (here) and Sonnet 3.7 (here). One aspect I found interesting is their presentation of results. With o3 you get something that feels like a human-written bug report, condensed to just present the findings, whereas with Sonnet 3.7 you get something like a stream of thought, or a work log. There are pros and cons to both. o3’s output is typically easier to follow due to its structure and focus. On the other hand, sometimes it is too brief, and clarity suffers."</p><p><a href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sean.heelan.io/2025/05/22/how-</span><span class="invisible">i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/</span></a></p><p><a href="https://tldr.nettime.org/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://tldr.nettime.org/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenerativeAI</span></a> <a href="https://tldr.nettime.org/tags/O3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>O3</span></a> <a href="https://tldr.nettime.org/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://tldr.nettime.org/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://tldr.nettime.org/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a></p>
DoomsdaysCW<p>Gee, I was just thinking that if the Sun decides to go "<a href="https://kolektiva.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a>" on us, that could put the damper on the AI menace that's been unleashed upon the planet...</p><p>The U.S. Ran Its First Space Weather Preparedness Drill—Here’s How It Went<br>Ironically, the exercise last May was interrupted by a real scenario, when Earth was hit by the strongest solar storm in two decades</p><p>Margherita Bassi - Daily Correspondent<br>May 21, 2025</p><p>"According to the NASA statement, the exercise demonstrated 'a critical need' for 'more robust forecasting capabilities of space weather drivers and effects.' The report also emphasizes the need to educate the public, continue developing response plans, make critical infrastructure less vulnerable and collaborate with both the private sector and international agencies." </p><p><a href="https://www.smithsonianmag.com/smart-news/the-us-ran-its-first-space-weather-preparedness-drill-heres-how-it-went-180986659/?utm_source=firefox-newtab-en-us" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">smithsonianmag.com/smart-news/</span><span class="invisible">the-us-ran-its-first-space-weather-preparedness-drill-heres-how-it-went-180986659/?utm_source=firefox-newtab-en-us</span></a></p><p><a href="https://kolektiva.social/tags/SolarFlares" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SolarFlares</span></a> <a href="https://kolektiva.social/tags/CarringtonEvent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CarringtonEvent</span></a> <a href="https://kolektiva.social/tags/LightsOut" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LightsOut</span></a> <a href="https://kolektiva.social/tags/XClassFlares" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XClassFlares</span></a> <a href="https://kolektiva.social/tags/SpaceWeather" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpaceWeather</span></a></p>