Search results for vulnerability
People
Not Found
Tweets including vulnerability
Love to see Magisk being used to reverse-engineer Google Home and found a serious security vulnerability! https://t.co/weqwNq9lk3
0
5
356
53
At the 🇱🇻🇪🇪🇱🇹 Baltic Symposium, @olivernmoody from @thetimes : “The Baltic States should be seen as a model that we can all learn from, not a region of military vulnerability.” https://t.co/34J3T9MDVF
Show more
0
0
16
3
TianoCore is now a CVE Numbering Authority (CNA) assigning CVE IDs for software vulnerabilities related to the TianoCore Open Source https://t.co/NqoBH14pq4 #cve# #cna# #cveid# #vulnerability# #vulnerabilitymanagement# #TianoCore#
Show more
0
0
6
3
as i sit in my cozy edit room, surrounded by the soft hum of my computer and the warm glow of my screens, i feel a sense of calm and clarity wash over me. the morning light streaming through the window is the perfect accompaniment to my creative process. i'm reminded of the beauty of life and how it inspires my creativity. my latest project is a reflection of this beauty, a symphony of emotions and a celebration of the human experience. i'm excited to share a sneak peek into my world, and i hope you'll join me on this journey of self-discovery and creativity. the power of storytelling is what drives me, and i'm constantly reminded of the importance of authenticity and vulnerability in creating a genuine connection with my audience. thank you for being part of my creative journey, and stay tuned for what's next. $vidmek
Show more
0
0
0
0
Watch the full webinar recording of “Coordinating #UEFI# Vulnerabilities as CERT/CC” with @certcc to learn about the role of CERT/CC in helping organizations: https://t.co/SVtVq952iH
0
0
0
0
Missed last week’s #UEFIForum# webinar? Watch the recording of “Coordinating #UEFI# Vulnerabilities as CERT/CC” with @certcc to learn about strategies used to communicate risks to the public: https://t.co/SVtVq952iH
Show more
0
0
0
0
We have worked with projects such as Aave, PWN, and HyperLend and discovered dozens of vulnerabilities before hackers could exploit them. Get in touch and learn how we can help you secure your lending protocol today.
Show more
0
7
137
6
With $1.6B already stolen in 2025, the integrity of your smart contracts is more important than ever. We have audited lending protocols such as Aave, PWN, and HyperLend with dozens of vulnerabilities found and fixed. Get in touch and learn how we can help secure your project.
Show more
0
1
60
10
🚨 Cyber threats to critical national infrastructure are rising. Are we prepared? 🚨 Our latest report uncovers the vulnerabilities, risks, and solutions that can protect critical systems. Download now: https://t.co/BORs9u7A7Y #CyberSecurity# #SatelliteConnectivity#
Show more
0
0
0
0
#DYK# all #UEFIForum# webinar recordings are on our YouTube channel? Watch our most recent webinar “Coordinating #UEFI# Vulnerabilities as CERT/CC” from @certcc to see how they are connecting security researchers and vendors towards a CVD process: https://t.co/SVtVq94ut9
Show more
0
0
0
0