Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Airtable Formula Injection - abusing formulas to steal data (pulsesecurity.co.nz)
3 points by aj-code 11 months ago | past
Binary patching Go's Net/HTTP to get the true HTTP headers (pulsesecurity.co.nz)
4 points by mosajjal on July 31, 2024 | past
Bypassing USBGuard on Linux (pulsesecurity.co.nz)
3 points by campuscodi on March 19, 2024 | past
Mashing Enter to bypass full disk encryption with TPM, Clevis dracut and systemd (pulsesecurity.co.nz)
188 points by Bender on Sept 1, 2023 | past | 127 comments
Mashing Enter to bypass [FDE] with TPM, Clevis, dracut and systemd (pulsesecurity.co.nz)
3 points by moviuro on Sept 1, 2023 | past
Azure DevOps CICD Pipelines – Command Injection and a Runner Hijacking (pulsesecurity.co.nz)
2 points by Terretta on May 1, 2023 | past
A Few Tailscale Tricks for Security Testers (pulsesecurity.co.nz)
3 points by rzk on Oct 13, 2022 | past
Brute Forcing TOTP Multi-Factor Authentication Is Surprisingly Realistic (pulsesecurity.co.nz)
2 points by goranmoomin on Sept 18, 2022 | past
Zerotier – multiple vulnerabilities lead to private network access (pulsesecurity.co.nz)
135 points by miles on Sept 20, 2021 | past | 42 comments
Authentication Security Controls You Might Be Missing (pulsesecurity.co.nz)
1 point by aj-code on June 8, 2020 | past
SQL Injection and Postgres – An adventure to eventual RCE (pulsesecurity.co.nz)
1 point by todsacerdoti on May 6, 2020 | past
Untitled Goose Game – Insecure Deserialization (pulsesecurity.co.nz)
1 point by lelf on Nov 1, 2019 | past
Extracting Bitlocker Keys from a TPM (pulsesecurity.co.nz)
112 points by hongseleco on March 13, 2019 | past | 40 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: