det.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon Server des Unterhaltungsfernsehen Ehrenfeld zum dezentralen Diskurs.

Administered by:

Server stats:

1.7K
active users

#security

270 posts175 participants0 posts today
IT News<p>The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest. - Wednesday’s discovery of three mis-issued TLS certificates f... - <a href="https://arstechnica.com/information-technology/2025/09/the-number-of-mis-issued-1-1-1-1-certificates-grows-heres-the-latest/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2025/09/the-number-of-mis-issued-1-1-1-1-certificates-grows-heres-the-latest/</span></a> <a href="https://schleuss.online/tags/transportlayersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transportlayersecurity</span></a> <a href="https://schleuss.online/tags/certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certificates</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/https" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>https</span></a> <a href="https://schleuss.online/tags/tls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tls</span></a></p>
IT News<p>Philips Hue Plans To Make All Your Lights Motion Sensors - Philips Hue is rolling out MotionAware, a new feature that turns its smart bulbs i... - <a href="https://hardware.slashdot.org/story/25/09/04/2138217/philips-hue-plans-to-make-all-your-lights-motion-sensors?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hardware.slashdot.org/story/25</span><span class="invisible">/09/04/2138217/philips-hue-plans-to-make-all-your-lights-motion-sensors?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Crypto News<p>New SEC Framework Maps Path for Post-Quantum Digital Asset Security - TLDR:</p><p>SEC submission sets 2035 as the target year for post-quantum cryptography across f... - <a href="https://blockonomi.com/new-sec-framework-maps-path-for-post-quantum-digital-asset-security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blockonomi.com/new-sec-framewo</span><span class="invisible">rk-maps-path-for-post-quantum-digital-asset-security/</span></a> <a href="https://schleuss.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://schleuss.online/tags/digitalassets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalassets</span></a> <a href="https://schleuss.online/tags/quantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantum</span></a>-safe <a href="https://schleuss.online/tags/regulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regulation</span></a> <a href="https://schleuss.online/tags/blockchain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blockchain</span></a> <a href="https://schleuss.online/tags/compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compliance</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/custody" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>custody</span></a> <a href="https://schleuss.online/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://schleuss.online/tags/pqc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pqc</span></a> <a href="https://schleuss.online/tags/sec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sec</span></a></p>
Lobsters<p>Subverting code integrity checks to locally backdoor Signal, 1Password, Slack, and more <a href="https://lobste.rs/s/yvua2g" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/yvua2g</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a><br><a href="https://blog.trailofbits.com/2025/09/03/subverting-code-integrity-checks-to-locally-backdoor-signal-1password-slack-and-more/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.trailofbits.com/2025/09/0</span><span class="invisible">3/subverting-code-integrity-checks-to-locally-backdoor-signal-1password-slack-and-more/</span></a></p>
Unofficial PetaPixel Bot<p>Nikon Z6 III’s C2PA Functionality Has a Significant Security Vulnerability <a href="https://petapixel.com/2025/09/04/nikon-z6-iiis-c2pa-functionality-has-a-significant-security-vulnerability/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">petapixel.com/2025/09/04/nikon</span><span class="invisible">-z6-iiis-c2pa-functionality-has-a-significant-security-vulnerability/</span></a> <a href="https://toot.earth/tags/contentauthenticityiniative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>contentauthenticityiniative</span></a> <a href="https://toot.earth/tags/contentauthenticity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>contentauthenticity</span></a> <a href="https://toot.earth/tags/contentcredentials" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>contentcredentials</span></a> <a href="https://toot.earth/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://toot.earth/tags/nikonz6iii" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nikonz6iii</span></a> <a href="https://toot.earth/tags/Equipment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Equipment</span></a> <a href="https://toot.earth/tags/firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmware</span></a> <a href="https://toot.earth/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://toot.earth/tags/nikon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nikon</span></a> <a href="https://toot.earth/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://toot.earth/tags/C2PA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C2PA</span></a></p>
heise online English<p>Vibe malware: Are detailed security messages encouraging AI imitations?</p><p>Tactics, techniques and procedures of attacker groups can be easily imitated with LLMs – perfect for false flag attacks. AI builds the malware.</p><p><a href="https://www.heise.de/en/news/Vibe-malware-Are-detailed-security-messages-encouraging-AI-imitations-10632766.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Vibe-malware-</span><span class="invisible">Are-detailed-security-messages-encouraging-AI-imitations-10632766.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://social.heise.de/tags/TrendMicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrendMicro</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise online English<p>Sitecore: Attackers can inject malicious code – without logging in</p><p>A critical security vulnerability has been identified in the Sitecore CMS that allows attackers to inject code. Attacks are apparently underway.</p><p><a href="https://www.heise.de/en/news/Sitecore-Attackers-can-inject-malicious-code-without-logging-in-10632484.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Sitecore-Atta</span><span class="invisible">ckers-can-inject-malicious-code-without-logging-in-10632484.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Cliff Barbier<p>I may be wrong, but I think that <a href="https://mastodon.social/tags/ESXi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESXi</span></a> is the only whole product name-checked by <a href="https://mastodon.social/tags/Mitre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mitre</span></a> <a href="https://mastodon.social/tags/Att" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Att</span></a>&amp;ck in the top-level techniques list. T1675</p><p>They don't say "Hypervisor administration command" or anything generic like that. They call out <a href="https://mastodon.social/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> "ESXi administration command" specifically. And that says a lot of bad things about the <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> about that product.</p>
heise online English<p>Critical infrastructures: attacks on industrial control systems possible</p><p>Important security updates have been released for industrial control systems from Hitachi and others. However, a patch is still pending.</p><p><a href="https://www.heise.de/en/news/Critical-infrastructures-attacks-on-industrial-control-systems-possible-10632262.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Critical-infr</span><span class="invisible">astructures-attacks-on-industrial-control-systems-possible-10632262.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
ITSEC News<p>Hackers exploited Sitecore zero-day flaw to deploy backdoors - Threat actors have been exploiting a zero-day vulnerability in legacy Sitecore deployment... <a href="https://www.bleepingcomputer.com/news/security/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
heise online English<p>Serial offenders confess to IT attack on Jaguar Land Rover</p><p>Three British criminal gangs have apparently joined forces. They brag about the IT attack on Jaguar Land Rover.</p><p><a href="https://www.heise.de/en/news/Serial-offenders-confess-to-IT-attack-on-Jaguar-Land-Rover-10631402.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Serial-offend</span><span class="invisible">ers-confess-to-IT-attack-on-Jaguar-Land-Rover-10631402.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Jaguar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jaguar</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Frederik Borgesius<p>Court of Justice of the European Union: 'pseudonymised data must not be regarded as constituting, in all cases and for every person, personal data’.</p><p>Unfortunate decision.</p><p>Press release: <a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2025-09/cp250107en.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">curia.europa.eu/jcms/upload/do</span><span class="invisible">cs/application/pdf/2025-09/cp250107en.pdf</span></a></p><p>Judgment: <a href="https://curia.europa.eu/juris/document/document_print.jsf?mode=lst&amp;pageIndex=0&amp;docid=303863&amp;part=1&amp;doclang=EN&amp;text=&amp;dir=&amp;occ=first&amp;cid=16539713" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">curia.europa.eu/juris/document</span><span class="invisible">/document_print.jsf?mode=lst&amp;pageIndex=0&amp;docid=303863&amp;part=1&amp;doclang=EN&amp;text=&amp;dir=&amp;occ=first&amp;cid=16539713</span></a></p><p><a href="https://akademienl.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://akademienl.social/tags/gdpr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gdpr</span></a> <a href="https://akademienl.social/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://akademienl.social/tags/law" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>law</span></a> <a href="https://akademienl.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://akademienl.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
GrapheneOS<p>GrapheneOS App Store version 32 released:</p><p><a href="https://github.com/GrapheneOS/AppStore/releases/tag/32" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/GrapheneOS/AppStore</span><span class="invisible">/releases/tag/32</span></a></p><p>See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog.</p><p>Forum discussion thread:</p><p><a href="https://discuss.grapheneos.org/d/26149-grapheneos-app-store-version-32-released" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discuss.grapheneos.org/d/26149</span><span class="invisible">-grapheneos-app-store-version-32-released</span></a></p><p><a href="https://grapheneos.social/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> <a href="https://grapheneos.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://grapheneos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://grapheneos.social/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://grapheneos.social/tags/repository" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>repository</span></a></p>
ITSEC News<p>Texas sues PowerSchool over breach exposing 62M students, 880k Texans - Texas Attorney General Ken Paxton has filed a lawsuit against education software company ... <a href="https://www.bleepingcomputer.com/news/security/texas-sues-powerschool-after-massive-data-breach-hit-62-million-students/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/texas-sues-powerschool-after-massive-data-breach-hit-62-million-students/</span></a> <a href="https://schleuss.online/tags/education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>education</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Mysk🇨🇦🇩🇪<p>X has introduced its end-to-end encrypted chat feature for users in the US. This service utilizes the Juicebox protocol, which enables users to secure their encryption keys with a simple, memorable 4-digit PIN. The Juicebox protocol is designed to distribute secrets across various organizations called realms. The protocol defends against any brute force attack and makes it impossible. X’s implementation is wrong because they own all the realms<br>🧵 1/2<br><a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
ITSEC News<p>Chess.com discloses recent data breach via file transfer app - Chess.com has disclosed a data breach after threat actors gained unauthorized access to a... <a href="https://www.bleepingcomputer.com/news/security/chesscom-discloses-recent-data-breach-via-file-transfer-app/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/chesscom-discloses-recent-data-breach-via-file-transfer-app/</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
ADMIN magazine<p>ICYMI: Conor Fitzgerald guides you through deploying a self-hosted Pritunl VPN server with multifactor authentication<br><a href="https://www.admin-magazine.com/Archive/2025/86/Self-hosted-Pritunl-VPN-server-with-MFA?utm_source=mam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Archive/202</span><span class="invisible">5/86/Self-hosted-Pritunl-VPN-server-with-MFA?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/Pritunl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pritunl</span></a> <a href="https://hachyderm.io/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://hachyderm.io/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://hachyderm.io/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://hachyderm.io/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a></p>
nixCraft 🐧<p>Over the past few days Cloudflare has been notified through our vulnerability disclosure program and the certificate transparency mailing list that unauthorized certificates were issued by Fina CA for 1.1.1.1, one of the IP addresses used by our public DNS resolver service. </p><p><a href="https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cloudflare.com/unauthoriz</span><span class="invisible">ed-issuance-of-certificates-for-1-1-1-1/</span></a></p><p>This is a general reminder that you don't need Cloudflare or any central DNS provider.</p><p><a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2384377/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2384377/</span><span class="invisible"></span></a> Ukraine allies ready to commit to post-war security guarantees – POLITICO <a href="https://pubeurope.com/tags/Conflicts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Conflicts</span></a> <a href="https://pubeurope.com/tags/DonaldTrump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DonaldTrump</span></a> <a href="https://pubeurope.com/tags/EmmanuelMacron" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmmanuelMacron</span></a> <a href="https://pubeurope.com/tags/EUUSMilitaryTies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUUSMilitaryTies</span></a> <a href="https://pubeurope.com/tags/france" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>france</span></a> <a href="https://pubeurope.com/tags/germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>germany</span></a> <a href="https://pubeurope.com/tags/italy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>italy</span></a> <a href="https://pubeurope.com/tags/KeirStarmer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KeirStarmer</span></a> <a href="https://pubeurope.com/tags/maritime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>maritime</span></a> <a href="https://pubeurope.com/tags/military" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>military</span></a> <a href="https://pubeurope.com/tags/nato" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nato</span></a> <a href="https://pubeurope.com/tags/oil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oil</span></a> <a href="https://pubeurope.com/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://pubeurope.com/tags/RussiaSanctions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussiaSanctions</span></a> <a href="https://pubeurope.com/tags/RussiaUkraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussiaUkraine</span></a> <a href="https://pubeurope.com/tags/RussiaUkraineWar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussiaUkraineWar</span></a> <a href="https://pubeurope.com/tags/RussianInvasionOfUkraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussianInvasionOfUkraine</span></a> <a href="https://pubeurope.com/tags/RussoUkrainianWar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussoUkrainianWar</span></a> <a href="https://pubeurope.com/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://pubeurope.com/tags/SteveWitkoff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SteveWitkoff</span></a> <a href="https://pubeurope.com/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a> <a href="https://pubeurope.com/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedStates</span></a> <a href="https://pubeurope.com/tags/VolodymyrZelenskyy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VolodymyrZelenskyy</span></a> <a href="https://pubeurope.com/tags/WarInUkraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WarInUkraine</span></a></p>
Lobsters<p>Cookie Chaos: How to bypass __Host and __Secure cookie prefixes <a href="https://lobste.rs/s/kmiwzp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/kmiwzp</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a><br><a href="https://portswigger.net/research/cookie-chaos-how-to-bypass-host-and-secure-cookie-prefixes" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">portswigger.net/research/cooki</span><span class="invisible">e-chaos-how-to-bypass-host-and-secure-cookie-prefixes</span></a></p>