Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

SpaceMan9000 ,

Honestly, for closed source software the POCs are also immediately available. Lots of threat actors just use patch diffing.

These days vulnerabilities are at times also patched with other non-related commits to conceal what exactly has changed.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linuxmemes@lemmy.world
  • random
  • incremental_games
  • meta
  • All magazines