schleuss.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance has a focus on IT security, general computing, retro video games and game collector discussion. Please, no #NSFW and other 18+ discussion on this instance. See rules for more details

Server stats:

12
active users

#remoteattackers

0 posts0 participants0 posts today
ITSEC News<p>2 More Google Chrome Zero-Days Under Active Exploitation - Browser users are once again being asked to patch severe vulnerabilities that can lead to remote c... <a href="https://threatpost.com/2-zero-day-bugs-google-chrome/161160/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/2-zero-day-bugs</span><span class="invisible">-google-chrome/161160/</span></a> <a href="https://schleuss.online/tags/stablechannelrelease" class="mention hashtag" rel="tag">#<span>stablechannelrelease</span></a> <a href="https://schleuss.online/tags/remotecodeexecution" class="mention hashtag" rel="tag">#<span>remotecodeexecution</span></a> <a href="https://schleuss.online/tags/activelyexploited" class="mention hashtag" rel="tag">#<span>activelyexploited</span></a> <a href="https://schleuss.online/tags/googleprojectzero" class="mention hashtag" rel="tag">#<span>googleprojectzero</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="tag">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/remoteattackers" class="mention hashtag" rel="tag">#<span>remoteattackers</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="tag">#<span>cve</span></a>-2020-16013 <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="tag">#<span>cve</span></a>-2020-16017 <a href="https://schleuss.online/tags/zerodayproject" class="mention hashtag" rel="tag">#<span>zerodayproject</span></a> <a href="https://schleuss.online/tags/securitybugs" class="mention hashtag" rel="tag">#<span>securitybugs</span></a> <a href="https://schleuss.online/tags/websecurity" class="mention hashtag" rel="tag">#<span>websecurity</span></a> <a href="https://schleuss.online/tags/freetype" class="mention hashtag" rel="tag">#<span>freetype</span></a> <a href="https://schleuss.online/tags/zero" class="mention hashtag" rel="tag">#<span>zero</span></a>-day <a href="https://schleuss.online/tags/browser" class="mention hashtag" rel="tag">#<span>browser</span></a> <a href="https://schleuss.online/tags/windows" class="mention hashtag" rel="tag">#<span>windows</span></a> <a href="https://schleuss.online/tags/chrome" class="mention hashtag" rel="tag">#<span>chrome</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="tag">#<span>google</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="tag">#<span>apple</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="tag">#<span>linux</span></a> <a href="https://schleuss.online/tags/patch" class="mention hashtag" rel="tag">#<span>patch</span></a> <a href="https://schleuss.online/tags/mac" class="mention hashtag" rel="tag">#<span>mac</span></a></p>
ITSEC News<p>Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs - Independent researchers found 125 different CVEs across 13 different router and NAS models. more: <a href="https://threatpost.com/asus-lenovo-routers-remotely-exploitable-bugs/148361/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/asus-lenovo-rou</span><span class="invisible">ters-remotely-exploitable-bugs/148361/</span></a> <a href="https://schleuss.online/tags/independentsecurityevaluators" class="mention hashtag" rel="tag">#<span>independentsecurityevaluators</span></a> <a href="https://schleuss.online/tags/networkattackedstorage" class="mention hashtag" rel="tag">#<span>networkattackedstorage</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="tag">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/remoteattackers" class="mention hashtag" rel="tag">#<span>remoteattackers</span></a> <a href="https://schleuss.online/tags/mobilesecurity" class="mention hashtag" rel="tag">#<span>mobilesecurity</span></a> <a href="https://schleuss.online/tags/securityflaws" class="mention hashtag" rel="tag">#<span>securityflaws</span></a> <a href="https://schleuss.online/tags/websecurity" class="mention hashtag" rel="tag">#<span>websecurity</span></a> <a href="https://schleuss.online/tags/pentesting" class="mention hashtag" rel="tag">#<span>pentesting</span></a> <a href="https://schleuss.online/tags/routers" class="mention hashtag" rel="tag">#<span>routers</span></a> <a href="https://schleuss.online/tags/lenovo" class="mention hashtag" rel="tag">#<span>lenovo</span></a> <a href="https://schleuss.online/tags/asus" class="mention hashtag" rel="tag">#<span>asus</span></a> <a href="https://schleuss.online/tags/iot" class="mention hashtag" rel="tag">#<span>iot</span></a> <a href="https://schleuss.online/tags/nas" class="mention hashtag" rel="tag">#<span>nas</span></a></p>