Can i get someones ig from his reddit????? Its for a good cause

this probably happens a lot but i just read a guy saying he is going to end his life (because of some problems with his gf) and i just feel so bad, i just know his reddit name and i wish i could do something Sorry if this is not supposed to be here i …

Fortinet fixed multiple command injection bugs in FortiADC and FortiTester

Fortinet addressed multiple vulnerabilities impacting its products and warned of a high-severity command injection flaw in FortiADC. Cybersecurity vendor Fortinet addressed several vulnerabilities impacting its products. The compaby also warned customers of a high-severity command injection flaw, tracked as CVE-2022-39947 (CVSS score of 8.6), affecting the Application Delivery Controller FortiADC. The CVE-2022-39947 flaw is an […]

The post Fortinet fixed multiple command injection bugs in FortiADC and FortiTester appeared first on Security Affairs.

Is it possible to hack iPhone or other phones memory to change values?

For example, if there exists an offline game, can I somehow hack and change the info on the memory addresses to for example add more gems? Or would it be possible to hack the Instagram app and prank somebody by changing their follower count to 1M – I …

im stuck

i dont know shit about hacking but im using telnet for fun but when i try to telnet to my ip it say somthig like cannot open connection to the host port 23 how do i fix this submitted by /u/MountainHorror6191 [link] [comments]

3D printer firmware change

How would one aproach the fact that he owns a 3D printer in EOL phase from the manufacturer and one needs to change a small feature on the firmware to allow a longer time to a specific function? submitted by /u/Oinq [link] [comments]

New shc Linux Malware used to deploy CoinMiner

Researchers discovered a new Linux malware developed with the shell script compiler (shc) that was used to deliver a cryptocurrency miner. The ASEC analysis team recently discovered that a Linux malware developed with shell script compiler (shc) that threat actors used to install a CoinMiner. The experts believe attackers initially compromised targeted devices through a […]

The post New shc Linux Malware used to deploy CoinMiner appeared first on Security Affairs.