Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agoFake ‘One Battle After Another’ torrent hides malware in subtitleswww.bleepingcomputer.comexternal-linkmessage-square5fedilinkarrow-up111arrow-down10cross-posted to: security@lemmy.mlpiracy@lemmy.dbzer0.com
arrow-up111arrow-down1external-linkFake ‘One Battle After Another’ torrent hides malware in subtitleswww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agomessage-square5fedilinkcross-posted to: security@lemmy.mlpiracy@lemmy.dbzer0.com
minus-squarearti@friendica.worldlinkfedilinkarrow-up1·26 days ago@aaaa if a sufficient amount of vics does exactly that it may work out (like bit error domains, or: artefact of speering vic)
@aaaa if a sufficient amount of vics does exactly that it may work out (like bit error domains, or: artefact of speering vic)