Skip to main content

Feds list the top 30 most exploited vulnerabilities. Many are years old

Hackers continue to exploit publicly known—and often dated—software vulnerabilities.
https://bit.ly/2WyeluB

Popular posts from this blog

With Stable Diffusion, you may never believe what you see online again

AI image synthesis goes open source, with big implications. https://bit.ly/3KSm8IT

ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner

We exhaustively tested ZFS and RAID performance on our Storage Hot Rod server. https://bit.ly/2zQI6v3

Rookie coding mistake prior to Gab hack came from site’s CTO

Site executive introduces, then removes, insecure code, then hides the evidence. https://bit.ly/308gk7w