social.sour.is
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
@kattenluik@feddit.nl to 196@lemmy.blahaj.zone • 1 year ago

Vulnerability rule

feddit.nl

message-square
11
fedilink
188

Vulnerability rule

feddit.nl

@kattenluik@feddit.nl to 196@lemmy.blahaj.zone • 1 year ago
message-square
11
fedilink
alert-triangle
You must log in or register to comment.
  • @MrWafflesNBacon@lemmy.world
    link
    fedilink
    English
    67•1 year ago

    Hopefully they release a security patch soon!!!

    • @cucumber_sandwich@lemmy.world
      link
      fedilink
      40•1 year ago

      Critical mainframe legacy banking software runs on Gameboy color!

      • @nodsocket@lemmy.world
        link
        fedilink
        28•1 year ago

        Somewhere in the IT department at a major bank, a gameboy is storing the private keys

  • Dojan
    link
    fedilink
    47•1 year ago

    Remotely??

    • 🔍🦘🛎
      link
      fedilink
      English
      24•1 year ago

      Via the infrared port!

      • @chellomere@lemmy.world
        link
        fedilink
        17•1 year ago

        No, via a special adapter that enables you to connect a GBC to a feature phone.

      • pewpew
        link
        fedilink
        9•1 year ago

        Somebody could send you harmful IR signals which could corrupt your Pokemon save file

        (/s)

    • @pory@lemmy.world
      link
      fedilink
      English
      6•1 year ago

      Mobile Adapter GB is a remote device.

      • Dojan
        link
        fedilink
        1•1 year ago

        That makes a lot of sense!

  • @lemming741@lemmy.world
    link
    fedilink
    22•1 year ago

    Have to patch it with a game genie

  • @navigatron@beehaw.org
    link
    fedilink
    10•1 year ago

    What!

    How many of these devices do we have in our asset inventory? Do they have a cvss score yet? Let’s just do it ourselves with an ssvc score. Can this be exploited remotely? Call crowdstrike, tell them to get a network detection written and deployed. How long do we have before the quarterly audit? Can our soc do threat hunts against this? Get me the RTOs, RPOs, and business impact assessment. Let’s MOVE, people!

196@lemmy.blahaj.zone

!196@lemmy.blahaj.zone

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !196@lemmy.blahaj.zone

Be sure to follow the rule before you head out.

Rule: You must post before you leave.

  • 322 users / day
  • 1.35K users / week
  • 4.18K users / month
  • 3.48K users / 6 months
  • 0 subscribers
  • 4.06K Posts
  • 23.8K Comments
  • Modlog
  • mods:
  • @threegnomes@lemmy.blahaj.zone
  • Moss's alt
  • @greembow@lemmy.blahaj.zone
  • moss
  • Queue
  • funky-rodent [he/him]
  • Queue
  • Peachy [they/them]
  • @greembow@lemmy.world
  • BE: 0.19.3
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org