home.social

#attacker — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #attacker, aggregated by home.social.

  1. What do we know about the #attacker, what happens to the #hostages — are they all safe, and is there any evidence of a connection to #Russia? Find out more about these questions via the link! counteroffensive.news/p/newsfl

  2. “OpenClaw can feel like a game changer for digital #communications. Its ability to monitor, summarize, and automate seems perfectly suited to managing a deluge of #emails and other #messages.

    I asked #Molty to read emails and flag anything that looked important. I had it ignore PR pitches (sorry PR friends!) and promotions, but asked it to summarize newsletters that I might want to read in full. In theory, #OpenClaw *should be* more than capable of setting up meetings by handling threads involving several people, although I haven’t tested this yet.

    It is important to note that giving #OpenClaw complete access to your real email is incredibly risky, because #AIModels can be tricked into sharing private #information with an #attacker

    #ZeroHourWork / #WhiteCollar / #AI <wired.com/story/malevolent-ai-> (paywall) / <archive.md/Lu5Py>

  3. The manhunt to arrest the intruder who attacked actor Saif Ali Khan in his Bandra residence on Thursday is still ongoing, with the Mumbai Police recording statements of over 30 people. One person has been detained for questioning.
    #Saif #Attacker #Run #BandraStation #MastIndia #MastodonIndians #India @mastodonindians
    ndtv.com/india-news/saif-ali-k

  4. The manhunt to arrest the intruder who attacked actor Saif Ali Khan in his Bandra residence on Thursday is still ongoing, with the Mumbai Police recording statements of over 30 people. One person has been detained for questioning.
    #Saif #Attacker #Run #BandraStation #MastIndia #MastodonIndians #India @mastodonindians
    ndtv.com/india-news/saif-ali-k

  5. The manhunt to arrest the intruder who attacked actor Saif Ali Khan in his Bandra residence on Thursday is still ongoing, with the Mumbai Police recording statements of over 30 people. One person has been detained for questioning.
    #Saif #Attacker #Run #BandraStation #MastIndia #MastodonIndians #India @mastodonindians
    ndtv.com/india-news/saif-ali-k

  6. #JasonKelce addresses #ViralVideo Showing Him Using #AntiLGBTQ #Slur against #homophobic #attacker.

    “Hey Kelce, how does it feel to know that your #brother is a “faggot” for #dating #TaylorSwift?” Kelce responded by grabbing and smashing his phone. When the heckler continued to #provoke him, approaching Kelce over the damaged phone, Kelce #confronted him face-to-face, asking, “Who's the “faggot” now?”

    #Women #Transgender #LGBTQ #LGBTQIA #Hate #Bigotry #Homophobia

    fanbuzz.com/nfl/jason-kelce-br

  7. #Girl, 11, and #woman, 34, #stabbed in #central #London.

    Abdullah, 29, who works at #TWGtea in #LeicesterSquare, said he #intervened to #stop the #attacker who had #blood on his #face and #chest. "It's horrible to be honest; I've never seen anything like that before," he said. "To do this to a kid, it's horrible."

    #Women #Transgender #LGBTQ #LGBTQIA #UK #Hate #Bigotry #Violence #Misogyny

    bbc.com/news/articles/ckg5xx0g

  8. #Girl, 11, and #woman, 34, #stabbed in #central #London.

    Abdullah, 29, who works at #TWGtea in #LeicesterSquare, said he #intervened to #stop the #attacker who had #blood on his #face and #chest. "It's horrible to be honest; I've never seen anything like that before," he said. "To do this to a kid, it's horrible."

    #Women #Transgender #LGBTQ #LGBTQIA #UK #Hate #Bigotry #Violence #Misogyny

    bbc.com/news/articles/ckg5xx0g

  9. The #usdHeroLab analysts examined the #SAP HTTP Content Server while conducting their #pentests.
    1⃣Vulnerability Type: Improper Neutralization of HTTP Headers for Scripting Syntax #CWE644 #CVE202326457
    🚨 Security Risk: High
    👇🧵 More details

    The SAP HTTP Content Server returns error messages in the header x-errordescription of the #HTTP Response. When invalid input is provided in a HTTP request, it is also placed in the error message inside this header.

    During this process the input is URL-decoded, therefore for example %41 is translated to A and %0a is translated to a newline. This enables an #attacker to add new headers and change the content of the response.

    The vulnerability was reported to the vendor under the Responsible Disclosure Policy and subsequently fixed for #moresecurity. More information can be found here 👩‍💻​👨‍💻​👇​
    herolab.usd.de/security-adviso

  10. https://mobiilivarmenne.fi is broken with invalid workflow. Request to allow transaction becomes before the #transaction #identifier is shown. Therefore users give transaction #authorization blindly. This could be exploited by #attacker. #mobiilivarmenne