並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 3 件 / 3件

新着順 人気順

triggeredの検索結果1 - 3 件 / 3件

  • Falcon Content Update Preliminary Post Incident Report | CrowdStrike

    Preliminary Post Incident Review (PIR): Content Configuration Update Impacting the Falcon Sensor and the Windows Operating System (BSOD) Updated 2024-07-25 1900 UTC Executive Summary PDF This is CrowdStrike’s preliminary Post Incident Review (PIR). We will be detailing our full investigation in the forthcoming Root Cause Analysis that will be released publicly. Throughout this PIR, we have used ge

      Falcon Content Update Preliminary Post Incident Report | CrowdStrike
    • Mastering Ruby Code Navigation: Major Ruby LSP Enhancements in the First Half of 2024

      In the first half of 2024, Ruby LSP has seen significant enhancements, particularly in the area of code navigation, thanks to the advancement of its indexer. In this post, we’ll dive into the major code navigation enhancements that have been made to Ruby LSP. We’ll also touch on some experimental features that are on the horizon. NOTE While the Ruby LSP server (ruby-lsp gem) can be integrated with

        Mastering Ruby Code Navigation: Major Ruby LSP Enhancements in the First Half of 2024
      • Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog

        Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors. ESXi is a bare-metal hypervisor that is installed directly onto a physical server and provides direct access and control of underlying resources. ESXi hypervisors host virtual machines that may include

          Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog
        1