Hacker News new | past | comments | ask | show | jobs | submit | from login
How APT groups operate in Southeast Asia (ptsecurity.com)
3 points by g147 45 days ago | past
Getting XXE in Web Browsers Using ChatGPT (ptsecurity.com)
1 point by albinowax_ 3 months ago | past
Source Code Disclosure in Asp.net via Cookieless Sessions (ptsecurity.com)
1 point by albinowax_ 6 months ago | past
Dark River. You can't see them, but they're there (ptsecurity.com)
1 point by campuscodi 11 months ago | past
Discovering Domains via a Time-Correlation Attack (ptsecurity.com)
2 points by sysadm1n on Sept 2, 2022 | past | 1 comment
Discovering Domains via a Time-Correlation Attack on Certificate Transparency (ptsecurity.com)
2 points by tomwas54 on Sept 1, 2022 | past
Discovering Domains via a Timing Attack on Certificate Transparency (ptsecurity.com)
1 point by rmdoss on Aug 13, 2022 | past
Exploiting Arbitrary Object Instantiations in PHP Without Custom Classes (ptsecurity.com)
1 point by westi on Aug 10, 2022 | past
Discovering Domains via a Timing Attack on Certificate Transparency (ptsecurity.com)
2 points by ghuntley on Aug 10, 2022 | past
Researching Open Source Apps for XSS to RCE Flaws (ptsecurity.com)
1 point by detaro on Aug 6, 2022 | past
Exploiting Arbitrary Object Instantiations in PHP Without Custom Classes (ptsecurity.com)
1 point by gravitate on July 16, 2022 | past
Exploiting Arbitrary Object Instantiations in PHP Without Custom Classes (ptsecurity.com)
3 points by wrayjustin on July 15, 2022 | past | 1 comment
A Kernel Hacker Meets Fuchsia OS (ptsecurity.com)
2 points by LaSombra on May 26, 2022 | past
Fuzzing for XSS via nested parsers condition (ptsecurity.com)
3 points by rrampage on Feb 10, 2022 | past
WinRAR’s vulnerable trialware: when free software isn’t free (ptsecurity.com)
1 point by Sami_Lehtinen on Oct 20, 2021 | past | 2 comments
We bypassed bytenode and decompiled Node.js bytecode in Ghidra (ptsecurity.com)
2 points by azalemeth on Oct 6, 2021 | past
Guide to P-code Injection: Changing the intermediate representation of code on (ptsecurity.com)
2 points by todsacerdoti on June 3, 2021 | past
We bypassed bytenode and decompiled Node.js bytecode in Ghidra (ptsecurity.com)
1 point by lazyjeff on May 15, 2021 | past
We bypassed bytenode and decompiled Node.js bytecode in Ghidra (ptsecurity.com)
2 points by todsacerdoti on May 13, 2021 | past
Positive Technologies' official statement following U.S. sanctions (ptsecurity.com)
3 points by f311a on April 17, 2021 | past
Four Bytes of Power: exploiting CVE-2021-26708 in the Linux kernel (ptsecurity.com)
1 point by g0xA52A2A on April 13, 2021 | past
Unauthorized RCE in VMware VCenter (ptsecurity.com)
2 points by notmine1337 on Feb 25, 2021 | past
Unauthorized RCE in VMware VCenter (ptsecurity.com)
13 points by pedro84 on Feb 24, 2021 | past | 1 comment
Vulnerabilities in PAN-OS could threaten internal networks security (ptsecurity.com)
1 point by sizzle on Sept 23, 2020 | past
Intel x86 root of trust:loss of trust (ptsecurity.com)
2 points by tejohnso on March 7, 2020 | past
Intel x86 Root of Trust: loss of trust (ptsecurity.com)
1 point by tosh on March 5, 2020 | past
Intel x86 Root of Trust: Loss of Trust (ptsecurity.com)
486 points by bcantrill on March 5, 2020 | past | 232 comments
Unfixable vulnerability in Intel chipsets threatens users (ptsecurity.com)
1 point by wglb on March 5, 2020 | past
Percent of Web Application Vulnerabilities Are in the Source Code (ptsecurity.com)
1 point by jjoachim3 on Feb 16, 2020 | past
Visa card vulnerability can bypass contactless limits (ptsecurity.com)
8 points by frozenice on July 31, 2019 | past | 10 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: