Tag: exploit code
-
Slashdot: Microsoft Reportedly Cuts China’s Early Access to Bug Disclosures, PoC Exploit Code
Source URL: https://it.slashdot.org/story/25/08/22/2059255/microsoft-reportedly-cuts-chinas-early-access-to-bug-disclosures-poc-exploit-code Source: Slashdot Title: Microsoft Reportedly Cuts China’s Early Access to Bug Disclosures, PoC Exploit Code Feedly Summary: AI Summary and Description: Yes Summary: Microsoft has modified its Microsoft Active Protections Program (MAPP) to restrict access to proof-of-concept exploit code for companies in certain countries, including China, to combat the leak of sensitive…
-
The Register: Microsoft reportedly cuts China’s early access to bug disclosures, PoC exploit code
Source URL: https://www.theregister.com/2025/08/21/microsoft_cuts_chinas_early_access/ Source: The Register Title: Microsoft reportedly cuts China’s early access to bug disclosures, PoC exploit code Feedly Summary: Better late than never after SharePoint assault? Microsoft has reportedly stopped giving Chinese companies proof-of-concept exploit code for soon-to-be-disclosed vulnerabilities following last month’s SharePoint zero-day attacks, which appear to be related to a leak…
-
The Register: Ex-NSA cyber-boss: AI will soon be a great exploit coder
Source URL: https://www.theregister.com/2025/04/30/exnsa_cyber_boss_ai_expoit_dev/ Source: The Register Title: Ex-NSA cyber-boss: AI will soon be a great exploit coder Feedly Summary: For now it’s a potential bug-finder and friend to defenders RSAC Former NSA cyber-boss Rob Joyce thinks today’s artificial intelligence is dangerously close to becoming a top-tier vulnerability exploit developer.… AI Summary and Description: Yes Summary:…
-
The Register: Today’s LLMs craft exploits from patches at lightning speed
Source URL: https://www.theregister.com/2025/04/21/ai_models_can_generate_exploit/ Source: The Register Title: Today’s LLMs craft exploits from patches at lightning speed Feedly Summary: Erlang? Er, man, no problem. ChatGPT, Claude to go from flaw disclosure to actual attack code in hours The time from vulnerability disclosure to proof-of-concept (PoC) exploit code can now be as short as a few hours,…
-
The Register: Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws
Source URL: https://www.theregister.com/2025/02/21/ivanti_traversal_flaw_poc_exploit/ Source: The Register Title: Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws Feedly Summary: PoC exploit code shows why this is a patch priority Security engineers have released a proof-of-concept exploit for four critical Ivanti Endpoint Manager bugs, giving those who haven’t already installed patches released in…
-
Rekt: Clober Dex – Rekt
Source URL: https://www.rekt.news/cloberdex-rekt Source: Rekt Title: Clober Dex – Rekt Feedly Summary: $500k vanished from Clober DEX when code changes met one of DeFi’s oldest vulnerabilities. The twist? The exploit code wasn’t there during the audits. Some security lessons write themselves. AI Summary and Description: Yes **Summary:** The incident involving Clober Dex highlights a severe…