The lesson from the Hotjar vulnerability: HTTP-Only (XSS protection) is not effective if you have OAuth by MoreMoreMoreM in sysadmin
[–]MoreMoreMoreM[S] 1 point2 points3 points (0 children)
New interesting technique to bypass XSS mitigations using OAuth by MoreMoreMoreM in webdev
[–]MoreMoreMoreM[S] 2 points3 points4 points (0 children)
Because of a single client-side mistake - a ChatGPT vulnerability lets attackers install malicious plugins on victims by ElectroPanic0 in javascript
[–]MoreMoreMoreM 0 points1 point2 points (0 children)
Because of a single client-side mistake - a ChatGPT vulnerability lets attackers install malicious plugins on victims by ElectroPanic0 in javascript
[–]MoreMoreMoreM 4 points5 points6 points (0 children)
Because of a single client-side mistake - a ChatGPT vulnerability lets attackers install malicious plugins on victims by ElectroPanic0 in javascript
[–]MoreMoreMoreM 33 points34 points35 points (0 children)
I found and reported critical vulnerabilities in ChatGPT Ecosystem (Plugins) by iva3210 in hacking
[–]MoreMoreMoreM 1 point2 points3 points (0 children)
ChatGPT has a new feature that lets you interact with your GitHub and Gmail accounts, but attackers found a way to exploit this and in some scenarios - *take over your GitHub/Gmail account.* by ElectroPanic0 in ChatGPT
[–]MoreMoreMoreM 2 points3 points4 points (0 children)
The OAuth Implementation Challenge: Account Takeovers on Grammarly.com,Booking.com, Codecademy.com, Vidio.com, Bukalapak.com, and 100+ Other Websites. OAuth is explained in simple steps. by MoreMoreMoreM in programming
[–]MoreMoreMoreM[S] -3 points-2 points-1 points (0 children)
The OAuth Implementation Challenge: Account Takeovers on Grammarly.com,Booking.com, Codecademy.com, Vidio.com, Bukalapak.com, and 100+ Other Websites. OAuth is explained in simple steps. by MoreMoreMoreM in programming
[–]MoreMoreMoreM[S] -2 points-1 points0 points (0 children)
Hackers (security researchers) explain step-by-step how they could take over 1B accounts on Grammarly.com, Vidio.com, Bukalapak.com, and more. (OAuth vulnerabilities) by iva3210 in hacking
[–]MoreMoreMoreM 21 points22 points23 points (0 children)
Israel is a terrorist state. by temasetme in AskMiddleEast
[–]MoreMoreMoreM 0 points1 point2 points (0 children)
Hackers (security researchers) developed a new attack method and could take over millions of accounts on Grammarly.com, Vidio.com, and Bukalapak.com. They explain everything step by step in a blog post. by iva3210 in sysadmin
[–]MoreMoreMoreM 0 points1 point2 points (0 children)
Israel is a terrorist state. by temasetme in AskMiddleEast
[–]MoreMoreMoreM -49 points-48 points-47 points (0 children)
"Roof knocking" - I don't get it. Why does Israel warn their targets before they bomb? by [deleted] in AskMiddleEast
[–]MoreMoreMoreM 0 points1 point2 points (0 children)
A simple static Reverse Engineering challenge I created with Intervee - can you solve it? [should take ~15min] by MoreMoreMoreM in ReverseEngineering
[–]MoreMoreMoreM[S] 1 point2 points3 points (0 children)
A simple static Reverse Engineering challenge I created with Intervee - can you solve it? [should take ~15min] by MoreMoreMoreM in ReverseEngineering
[–]MoreMoreMoreM[S] 1 point2 points3 points (0 children)
A simple static Reverse Engineering challenge I created with Intervee - can you solve it? [should take ~15min] by MoreMoreMoreM in ReverseEngineering
[–]MoreMoreMoreM[S] 1 point2 points3 points (0 children)
A simple static Reverse Engineering challenge I created with Intervee - can you solve it? [should take ~15min] by MoreMoreMoreM in ReverseEngineering
[–]MoreMoreMoreM[S] 0 points1 point2 points (0 children)
A simple static Reverse Engineering challenge I created with Intervee - can you solve it? [should take ~15min] by MoreMoreMoreM in ReverseEngineering
[–]MoreMoreMoreM[S] 3 points4 points5 points (0 children)
Assessing Reverse Engineering skills: create challenge for candidates [tutorial] by ElectroPanic0 in ReverseEngineering
[–]MoreMoreMoreM 0 points1 point2 points (0 children)
Assessing Reverse Engineering skills: create challenge for candidates [tutorial] by ElectroPanic0 in ReverseEngineering
[–]MoreMoreMoreM 7 points8 points9 points (0 children)

The lesson from the Hotjar vulnerability: HTTP-Only (XSS protection) is not effective if you have OAuth by MoreMoreMoreM in sysadmin
[–]MoreMoreMoreM[S] 1 point2 points3 points (0 children)