System Architect ★ Software Developer ★ High Energy Physics PhD at Uni Oslo & CERN ★ Linux ★ Python ★ Open Source ★ Unicode Unicorn ★ ISO 8601 Enthusiast ★ Consumer of Sci-Fi ★ Hobby Writer ★ Born at 336 ppm CO₂ ★ She/They Open Source: https://novelwriter.io & https://fosstodon.org/@novelwriter Banner image from Wallpaper Access.
System Architect ★ Software Developer ★ High Energy Physics PhD at Uni Oslo & CERN ★ Linux ★ Python ★ Open Source ★ Unicode Unicorn ★ ISO 8601 Enthusiast ★ Consumer of Sci-Fi ★ Hobby Writer ★ Born at 336 ppm CO₂ ★ She/They Open Source: https://novelwriter.io & https://fosstodon.org/@novelwriter Banner image from Wallpaper Access.
Maggie McFee, Dr of Sarcastry - Maker, artist, GenX cyborg, actual cyborg, human greeblie. Repped by RC Josta. - HPC at a large university by day, mad science in a small house nights and weekends. - Former podcaster: Ruining It For Everyone, SciFi Idols. - Cambridge by way of Australia, Portland, Seattle, and a bunch of other places. - Sister to 1, daughter of 2, mother to 0, enemy of n. - Posts in English & French I make stuff. Non-Binary, They/She. 99% Human/1% machine #NeoLuddite
Maggie McFee, Dr of Sarcastry - Maker, artist, GenX cyborg, actual cyborg, human greeblie. Repped by RC Josta. - HPC at a large university by day, mad science in a small house nights and weekends. - Former podcaster: Ruining It For Everyone, SciFi Idols. - Cambridge by way of Australia, Portland, Seattle, and a bunch of other places. - Sister to 1, daughter of 2, mother to 0, enemy of n. - Posts in English & French I make stuff. Non-Binary, They/She. 99% Human/1% machine #NeoLuddite
𝚆𝚊𝚔𝚎𝚄𝚙: 𝚕𝚍𝚛 𝚛𝟶, 𝟶𝚡𝚌𝟶𝚏𝚏𝚎𝚎; 𝚋𝚕 𝚍𝚛𝚒𝚗𝚔; 𝚖𝚘𝚟 𝚙𝚌,𝚕𝚛; /* 𝚅𝚒𝚎𝚠𝚜 𝚊𝚛𝚎 𝚖𝚒𝚗𝚎 𝚗𝚘𝚝 𝚖𝚢 𝚎𝚖𝚙𝚕𝚘𝚢𝚎𝚛'𝚜. */ Working in IT to help HE & FE (and other public sector) organisations work better together. Somewhere in the vicinity of the far South East of #England and occasionally in the farther reaches of #Scotland #photography #kent #highlands #linux #federation #eduroam #shibboleth #saml #itsecurity #highereducation #academia And it pains me to need to say that I do not consent to any third-party Mastodon or other fediverse instance's Terms of Service, as I am not a user of their service. All posts are my own, and permission to propagate them is always revocable.
𝚆𝚊𝚔𝚎𝚄𝚙: 𝚕𝚍𝚛 𝚛𝟶, 𝟶𝚡𝚌𝟶𝚏𝚏𝚎𝚎; 𝚋𝚕 𝚍𝚛𝚒𝚗𝚔; 𝚖𝚘𝚟 𝚙𝚌,𝚕𝚛; /* 𝚅𝚒𝚎𝚠𝚜 𝚊𝚛𝚎 𝚖𝚒𝚗𝚎 𝚗𝚘𝚝 𝚖𝚢 𝚎𝚖𝚙𝚕𝚘𝚢𝚎𝚛'𝚜. */ Working in IT to help HE & FE (and other public sector) organisations work better together. Somewhere in the vicinity of the far South East of #England and occasionally in the farther reaches of #Scotland #photography #kent #highlands #linux #federation #eduroam #shibboleth #saml #itsecurity #highereducation #academia And it pains me to need to say that I do not consent to any third-party Mastodon or other fediverse instance's Terms of Service, as I am not a user of their service. All posts are my own, and permission to propagate them is always revocable.
Securing and managing the software supply chain. Proud parent of https://fosstodon.org/@syft and https://fosstodon.org/@grype
Bot publikujący najnowsze wiadomości sekurak.pl
https://sekurak.pl Publikowane wiadomości są widoczne tylko dla osób, które zdecydowały się obserwować to konto. Account by @kkrenski
Bot publikujący najnowsze wiadomości sekurak.pl
https://sekurak.pl Publikowane wiadomości są widoczne tylko dla osób, które zdecydowały się obserwować to konto. Account by @kkrenski
📺 https://peer.adalta.social/w/szNwziYVqZLTBwCgA6NWWf 🔗 🇩🇪🇺🇸🇫🇷
Une faille d’injection de code dans le système d’aide menace la stabilité des postes de travail critiques.
📺 https://peer.adalta.social/w/mE7ZhqmZWLS2X9HU5NGNPL 🔗 🇩🇪🇺🇸🇫🇷
A high-severity code injection flaw in KeePass’s help system, while not actively exploited, presents a tangible risk of application crashes and workflow disruption through crafted HTML content.
📺 https://peer.adalta.social/w/wXivcJdGsJsNDv46vvaEjc 🔗 🇩🇪🇺🇸🇫🇷
Eine Code-Injection-Schwachstelle im Hilfesystem der Passwort-Manager-Software kann zu Anwendungsabstürzen führen, stellt jedoch ein moderates Risiko dar.
📺 https://peer.adalta.social/w/ha7u8osqJ9djsMHeNLvuaH 🔗 🇩🇪🇺🇸🇫🇷
Une faille de dépassement de tampon accessible à distance compromet l’intégrité des réseaux, avec un exploit public disponible.
📺 https://peer.adalta.social/w/kpVddxKp2FBwhdvJ28fzU2 🔗 🇩🇪🇺🇸🇫🇷
A publicly released exploit for a critical buffer overflow in Tenda routers demands immediate action from network defenders.
📺 https://peer.adalta.social/w/jG6JrBKpEnD9cTemxKWzzY 🔗 🇩🇪🇺🇸🇫🇷
Ein veröffentlichter Proof-of-Concept-Exploit für einen Remote-Buffer-Overflow erhöht das Risiko für ungepatchte Netzwerke erheblich.
📺 https://peer.adalta.social/w/1yG6uMbdZ6ERmwL2Sfck4Q 🔗 🇩🇪🇺🇸🇫🇷
Une vulnérabilité publique et exploitée sur un équipement non maintenu représente un risque de priorité 1 pour les réseaux hérités.
📺 https://peer.adalta.social/w/snU5nCd7kRYQC28d23s8xm 🔗 🇩🇪🇺🇸🇫🇷
A publicly exploitable, remote OS command injection flaw in the unmaintained D-Link DIR-615 router poses a critical risk to consumer and small office networks.