| Homepage | https://0xdeadbeef.info |
| GitHub | https://github.com/0xdea |

| Homepage | https://0xdeadbeef.info |
| GitHub | https://github.com/0xdea |
docs.rs builds are about to change. If you have crates published on crates.io/docs.rs, I recommend you read this blog post in case you might be impacted by this change: https://blog.rust-lang.org/2026/04/04/docsrs-only-default-targets/

Longtime Slashdot reader fahrbot-bot writes: CU Boulder researchers are reporting that they have discovered an appetite-suppressing compound in python blood that helps the snakes consume enormous meals and go months without eating yet remain metabolically healthy. The findings were published in the...
#CyberSecurity
#SupplyChain
#CERTEU
A compromised version of Trivy gave attackers access to the European Commission’s europa.eu platform hosted on AWS.
We have published our analysis – what happened, who is affected, and what to do – in full transparency and in agreement with the European Commission.
https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain
🫡 We’re back.
Today, we’re publishing vulnerabilities we discovered, disclosed, and chained to achieve pre-auth RCE against Progress ShareFile.
Enjoy the journey with us, while you sob into your hands ðŸ«

If you squint and look at the CISA KEV list, you might think it's made up exclusively of vulnerabilities in file transfer solutions. While this would be wrong (and you shouldn’t squint, it’s bad for your eyes), file transfer solutions do play a decent role in the CISA