vulnerability

Security

Uncovering a Critical 0-Day: How One Researcher Exposed Their ISP

This video is from Low Level Learning. This is truly one of the craziest scenarios I’ve ever seen. An API endpoint left wide open lets you hack anyone’s router. Article: https://samcurry.net/hacking-millions-of-modems Consider the modem—a device so ubiquitous and essential that it fades into the background of our digital lives. It’s our gateway to the vast […]

Read More
Security

MAJOR EXPLOIT: This GIF can Backdoor ANY Android Phone [Zero-Day]

In this video, Daniel Boctor takes a deep dive into the inner mechanics of a double free vulnerability within Android OS, allowing attackers to gain complete access to any Android mobile phone with an RCE (remote code execution). This vulnerability was exploited by creating a custom GIF file and sending it to a user in […]

Read More
Developer Security

Generating Pseudo-Random Numbers in C – What You Need to Know

Low Level Learning explains why random numbers in C are not necessarily random. You’ve probably heard of rand( ). You’ve probably even used it in your code. But unfortunately, you’ve probably used it wrong. In this video, I talk about the glibc implementation of a random number generator, rand, why it’s bad, and what other […]

Read More
Security

Playing with ZERO-DAY vulnerability “follina”

In this video NetworkChuck teamed up with John Hammond to talk about the NEW and SCARY Microsoft Vulnerability. NetworkChuck and John Hammond are going to teach you about a new dangerous Windows Zero-day vulnerability called “follina” and they are even going to show you how to test it out in your own Zero-day lab using […]

Read More
Java Security

Log4J & JNDI Exploit: Why So Bad? – Computerphile

By now, you have certainly heard of the Log4J exploit and that it’s been called the “most critical vulnerability of the last decade.” Dr Bagley and Dr Pound explain why it’s so pervasive.

Read More
Security

Nvidia Patches Vulnerable Drivers/vGPUs and TikTok Caught!

TikTok To Stop Scraping Clipboard Data, a Nationwide Bill could Ban Facial Recognition, and Nvidia Discloses Multiple Vulnerabilities.

Read More