schleuss.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance has a focus on IT security, general computing, retro video games and game collector discussion. Please, no #NSFW and other 18+ discussion on this instance. See rules for more details

Server stats:

11
active users

#securityhacks

1 post1 participant0 posts today
IT News<p>This Week in Security: CVSS 0, Chwoot, and Not in the Threat Model - This week a reader sent me a story about a CVE in Notepad++, and something isn’t q... - <a href="https://hackaday.com/2025/10/03/this-week-in-security-cvss-0-chwoot-and-not-in-the-threat-model/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/10/03/this-w</span><span class="invisible">eek-in-security-cvss-0-chwoot-and-not-in-the-threat-model/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/chroot" class="mention hashtag" rel="tag">#<span>chroot</span></a> <a href="https://schleuss.online/tags/cvss" class="mention hashtag" rel="tag">#<span>cvss</span></a> <a href="https://schleuss.online/tags/sudo" class="mention hashtag" rel="tag">#<span>sudo</span></a> <a href="https://schleuss.online/tags/sev" class="mention hashtag" rel="tag">#<span>sev</span></a></p>
IT News<p>This Week in Security: Randomness is Hard, SNMP Shouldn’t Be Public, and GitHub Malware Delivery - Randomness is hard. To be precise, without dedicated hardware, randomness is impos... - <a href="https://hackaday.com/2025/09/26/this-week-in-security-randomness-is-hard-snmp-shouldnt-be-public-and-github-malware-delivery/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/09/26/this-w</span><span class="invisible">eek-in-security-randomness-is-hard-snmp-shouldnt-be-public-and-github-malware-delivery/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/randomness" class="mention hashtag" rel="tag">#<span>randomness</span></a> <a href="https://schleuss.online/tags/snmp" class="mention hashtag" rel="tag">#<span>snmp</span></a> <a href="https://schleuss.online/tags/bmc" class="mention hashtag" rel="tag">#<span>bmc</span></a></p>
IT News<p>This Week in Security: The Shai-Hulud Worm, ShadowLeak, and Inside the Great Firewall - Hardly a week goes by that there isn’t a story to cover about malware getting publ... - <a href="https://hackaday.com/2025/09/19/this-week-in-security-the-shai-hulud-worm-shadowleak-and-inside-the-great-firewall/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/09/19/this-w</span><span class="invisible">eek-in-security-the-shai-hulud-worm-shadowleak-and-inside-the-great-firewall/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/promptinjection" class="mention hashtag" rel="tag">#<span>promptinjection</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/adfraud" class="mention hashtag" rel="tag">#<span>adfraud</span></a> <a href="https://schleuss.online/tags/npm" class="mention hashtag" rel="tag">#<span>npm</span></a></p>
IT News<p>The Inside Story of the UK’s Great CB Petrol Scam - Looking at gasoline prices today, it’s hard to believe that there was a time when ... - <a href="https://hackaday.com/2025/09/19/the-inside-story-of-the-uks-great-cb-petrol-scam/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/09/19/the-in</span><span class="invisible">side-story-of-the-uks-great-cb-petrol-scam/</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/radiohacks" class="mention hashtag" rel="tag">#<span>radiohacks</span></a> <a href="https://schleuss.online/tags/petrolscam" class="mention hashtag" rel="tag">#<span>petrolscam</span></a> <a href="https://schleuss.online/tags/gasoline" class="mention hashtag" rel="tag">#<span>gasoline</span></a> <a href="https://schleuss.online/tags/exploit" class="mention hashtag" rel="tag">#<span>exploit</span></a> <a href="https://schleuss.online/tags/burner" class="mention hashtag" rel="tag">#<span>burner</span></a> <a href="https://schleuss.online/tags/linear" class="mention hashtag" rel="tag">#<span>linear</span></a> <a href="https://schleuss.online/tags/theft" class="mention hashtag" rel="tag">#<span>theft</span></a> <a href="https://schleuss.online/tags/cb" class="mention hashtag" rel="tag">#<span>cb</span></a> <a href="https://schleuss.online/tags/uk" class="mention hashtag" rel="tag">#<span>uk</span></a></p>
IT News<p>This Week in Security: NPM, Kerbroasting, and The Rest of the Story - Two billion downloads per week. That’s the download totals for the NPM packages co... - <a href="https://hackaday.com/2025/09/12/this-week-in-security-npm-kerbroasting-and-the-rest-of-the-story/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/09/12/this-w</span><span class="invisible">eek-in-security-npm-kerbroasting-and-the-rest-of-the-story/</span></a> <a href="https://schleuss.online/tags/obfuscatedccodecontest" class="mention hashtag" rel="tag">#<span>obfuscatedccodecontest</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> #0-days <a href="https://schleuss.online/tags/npm" class="mention hashtag" rel="tag">#<span>npm</span></a></p>
IT News<p>This Week in Security: DNS Oops, Novel C2s, and the Scam Becomes Real - Something rather significant happened on the Internet back in May, and it seems th... - <a href="https://hackaday.com/2025/09/05/this-week-in-security-dns-oops-novel-c2s-and-the-scam-becomes-real/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/09/05/this-w</span><span class="invisible">eek-in-security-dns-oops-novel-c2s-and-the-scam-becomes-real/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/commandandcontrol" class="mention hashtag" rel="tag">#<span>commandandcontrol</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/aipersuasion" class="mention hashtag" rel="tag">#<span>aipersuasion</span></a> <a href="https://schleuss.online/tags/dns" class="mention hashtag" rel="tag">#<span>dns</span></a></p>
IT News<p>Ask Hackaday: Now You Install Your Friends’ VPNs. But Which One? - Something which may well unite Hackaday readers is the experience of being “The co... - <a href="https://hackaday.com/2025/09/03/ask-hackaday-now-you-install-your-friends-vpns-but-which-one/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/09/03/ask-ha</span><span class="invisible">ckaday-now-you-install-your-friends-vpns-but-which-one/</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/onlinesafetyact" class="mention hashtag" rel="tag">#<span>onlinesafetyact</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/commercailvpn" class="mention hashtag" rel="tag">#<span>commercailvpn</span></a> <a href="https://schleuss.online/tags/chatcontrol" class="mention hashtag" rel="tag">#<span>chatcontrol</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/vpn" class="mention hashtag" rel="tag">#<span>vpn</span></a></p>
IT News<p>This Week in Security: DEF CON Nonsense, Vibepwned, and 0-days - DEF CON happened just a few weeks ago, and it’s time to cover some of the interest... - <a href="https://hackaday.com/2025/08/29/this-week-in-security-def-con-nonsense-vibepwned-and-0-days/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/29/this-w</span><span class="invisible">eek-in-security-def-con-nonsense-vibepwned-and-0-days/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/disputedresearch" class="mention hashtag" rel="tag">#<span>disputedresearch</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/catgirls" class="mention hashtag" rel="tag">#<span>catgirls</span></a> <a href="https://schleuss.online/tags/phrack" class="mention hashtag" rel="tag">#<span>phrack</span></a></p>
IT News<p>This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research - You may have noticed the Anime Catgirls when trying to get to the Linux Kernel’s m... - <a href="https://hackaday.com/2025/08/22/this-week-in-security-anime-catgirls-illegal-adblock-and-disputed-research/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/22/this-w</span><span class="invisible">eek-in-security-anime-catgirls-illegal-adblock-and-disputed-research/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/disputedresearch" class="mention hashtag" rel="tag">#<span>disputedresearch</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/catgirls" class="mention hashtag" rel="tag">#<span>catgirls</span></a> <a href="https://schleuss.online/tags/phrack" class="mention hashtag" rel="tag">#<span>phrack</span></a></p>
IT News<p>Sniffing 5G with Software-Defined Radio - The fifth generation mobile communications protocol (5G) is perhaps the most compl... - <a href="https://hackaday.com/2025/08/18/sniffing-5g-with-software-defined-radio/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/18/sniffi</span><span class="invisible">ng-5g-with-software-defined-radio/</span></a> <a href="https://schleuss.online/tags/wirelesssniffing" class="mention hashtag" rel="tag">#<span>wirelesssniffing</span></a> <a href="https://schleuss.online/tags/cellularnetwork" class="mention hashtag" rel="tag">#<span>cellularnetwork</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/wirelesshacks" class="mention hashtag" rel="tag">#<span>wirelesshacks</span></a> <a href="https://schleuss.online/tags/cellular" class="mention hashtag" rel="tag">#<span>cellular</span></a> <a href="https://schleuss.online/tags/5g" class="mention hashtag" rel="tag">#<span>5g</span></a></p>
IT News<p>This Week in Security: The AI Hacker, FortMajeure, and Project Zero - One of the hot topics currently is using LLMs for security research. Poor quality ... - <a href="https://hackaday.com/2025/08/15/this-week-in-security-the-ai-hacker-fortmajeure-and-project-zero/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/15/this-w</span><span class="invisible">eek-in-security-the-ai-hacker-fortmajeure-and-project-zero/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/projectzero" class="mention hashtag" rel="tag">#<span>projectzero</span></a> <a href="https://schleuss.online/tags/darpa" class="mention hashtag" rel="tag">#<span>darpa</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a></p>
IT News<p>This Week in Security: Perplexity v Cloudflare, GreedyBear, and HashiCorp - The Internet is fighting over whether robots.txt applies to AI agents. It all star... - <a href="https://hackaday.com/2025/08/08/this-week-in-security-perplexity-v-cloudflare-greedybear-and-hashicorp/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/08/this-w</span><span class="invisible">eek-in-security-perplexity-v-cloudflare-greedybear-and-hashicorp/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/greedybear" class="mention hashtag" rel="tag">#<span>greedybear</span></a> <a href="https://schleuss.online/tags/hashicorp" class="mention hashtag" rel="tag">#<span>hashicorp</span></a> <a href="https://schleuss.online/tags/nvidia" class="mention hashtag" rel="tag">#<span>nvidia</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a></p>
IT News<p>Why Names Break Systems - Web systems are designed to be simple and reliable. Designing for the everyday per... - <a href="https://hackaday.com/2025/08/05/why-names-break-systems/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/05/why-na</span><span class="invisible">mes-break-systems/</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/codeinjection" class="mention hashtag" rel="tag">#<span>codeinjection</span></a> <a href="https://schleuss.online/tags/sqlinjection" class="mention hashtag" rel="tag">#<span>sqlinjection</span></a> <a href="https://schleuss.online/tags/apostrophe" class="mention hashtag" rel="tag">#<span>apostrophe</span></a> <a href="https://schleuss.online/tags/webdesign" class="mention hashtag" rel="tag">#<span>webdesign</span></a> <a href="https://schleuss.online/tags/unicode" class="mention hashtag" rel="tag">#<span>unicode</span></a> <a href="https://schleuss.online/tags/ascii" class="mention hashtag" rel="tag">#<span>ascii</span></a></p>
IT News<p>This Week in Security: Spilling Tea, Rooting AIs, and Accusing of Backdoors - The Tea app has had a rough week. It’s not an unfamiliar story: Unsecured Firebase... - <a href="https://hackaday.com/2025/08/01/this-week-in-security-spilling-tea-rooting-ais-and-accusing-of-backdoors/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/01/this-w</span><span class="invisible">eek-in-security-spilling-tea-rooting-ais-and-accusing-of-backdoors/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/nvidia" class="mention hashtag" rel="tag">#<span>nvidia</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="tag">#<span>linux</span></a> <a href="https://schleuss.online/tags/tea" class="mention hashtag" rel="tag">#<span>tea</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="tag">#<span>ai</span></a></p>
IT News<p>When Online Safety Means Surrendering Your ID, What Can You Do? - A universal feature of traveling Europe as a Hackaday scribe is that when you sit ... - <a href="https://hackaday.com/2025/07/31/when-online-safety-means-surrendering-your-id-what-can-you-do/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/31/when-o</span><span class="invisible">nline-safety-means-surrendering-your-id-what-can-you-do/</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/ageverification" class="mention hashtag" rel="tag">#<span>ageverification</span></a> <a href="https://schleuss.online/tags/onlinesafetyact" class="mention hashtag" rel="tag">#<span>onlinesafetyact</span></a> <a href="https://schleuss.online/tags/currentevents" class="mention hashtag" rel="tag">#<span>currentevents</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/rants" class="mention hashtag" rel="tag">#<span>rants</span></a> <a href="https://schleuss.online/tags/uk" class="mention hashtag" rel="tag">#<span>uk</span></a></p>
IT News<p>This Week in Security: Sharepoint, Initramfs, and More - There was a disturbance in the enterprise security world, and it started with a Pw... - <a href="https://hackaday.com/2025/07/25/this-week-in-security-sharepoint-initramfs-and-more/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/25/this-w</span><span class="invisible">eek-in-security-sharepoint-initramfs-and-more/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/secureboot" class="mention hashtag" rel="tag">#<span>secureboot</span></a> <a href="https://schleuss.online/tags/sharepoint" class="mention hashtag" rel="tag">#<span>sharepoint</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="tag">#<span>linux</span></a></p>
IT News<p>This Week in Security: Trains, Fake Homebrew, and AI Auto-Hacking - There’s a train vulnerability making the rounds this week. The research comes from... - <a href="https://hackaday.com/2025/07/18/this-week-in-security-trains-fake-homebrew-and-ai-auto-hacking/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/18/this-w</span><span class="invisible">eek-in-security-trains-fake-homebrew-and-ai-auto-hacking/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/viberesearching" class="mention hashtag" rel="tag">#<span>viberesearching</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/homebrew" class="mention hashtag" rel="tag">#<span>homebrew</span></a> <a href="https://schleuss.online/tags/trains" class="mention hashtag" rel="tag">#<span>trains</span></a></p>
IT News<p>A Vulnerable Simulator for Drone Penetration Testing - The old saying that the best way to learn is by doing holds as true for penetrati... - <a href="https://hackaday.com/2025/07/18/a-vulnerable-simulator-for-drone-penetration-testing/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/18/a-vuln</span><span class="invisible">erable-simulator-for-drone-penetration-testing/</span></a> <a href="https://schleuss.online/tags/penetrationtesting" class="mention hashtag" rel="tag">#<span>penetrationtesting</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/dronesecurity" class="mention hashtag" rel="tag">#<span>dronesecurity</span></a> <a href="https://schleuss.online/tags/dronehacks" class="mention hashtag" rel="tag">#<span>dronehacks</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/drone" class="mention hashtag" rel="tag">#<span>drone</span></a></p>
IT News<p>This SSD Will Self Destruct in Ten Seconds… - In case you can’t wait for your flash memory to die from write cycling, TeamGroup ... - <a href="https://hackaday.com/2025/07/16/this-ssd-will-self-destruct-in-ten-seconds/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/16/this-s</span><span class="invisible">sd-will-self-destruct-in-ten-seconds/</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/selfdestruct" class="mention hashtag" rel="tag">#<span>selfdestruct</span></a> <a href="https://schleuss.online/tags/flashmemory" class="mention hashtag" rel="tag">#<span>flashmemory</span></a></p>
IT News<p>This Week in Security: Bitchat, CitrixBleed Part 2, Opossum, and TSAs - @jack is back with a weekend project. Yes, that Jack. [Jack Dorsey] spent last wee... - <a href="https://hackaday.com/2025/07/11/this-week-in-security-bitchat-citrixbleed-part-2-opossum-and-tsas/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/11/this-w</span><span class="invisible">eek-in-security-bitchat-citrixbleed-part-2-opossum-and-tsas/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="tag">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/bitchat" class="mention hashtag" rel="tag">#<span>bitchat</span></a> <a href="https://schleuss.online/tags/opossum" class="mention hashtag" rel="tag">#<span>opossum</span></a> <a href="https://schleuss.online/tags/mcp" class="mention hashtag" rel="tag">#<span>mcp</span></a></p>