☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 11 days agoGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 11 days agomessage-square0fedilink
Zerush@lemmy.ml · 11 days agoHacker hacked hackersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacker hacked hackersplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 11 days agomessage-square0fedilink
maltfield@lemmy.ml · 14 days agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@lemmy.ml · 14 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agoTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 30 days agoMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.eu☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 30 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 1 month agoRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coCedric@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Cedric@lemmy.ml · 2 months agoLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgCedric@lemmy.ml · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 2 months agotwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linktwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comArthur Besse@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Zerush@lemmy.ml · 2 months agoMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoVSCode’s SSH Agent Is Bananasplus-squarefly.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVSCode’s SSH Agent Is Bananasplus-squarefly.io☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0fedilink
davel@lemmy.mlEnglish · 2 months agoViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comdavel@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · edit-22 months agoAMD Zen 1 through Zen 4 CPUs use an insecure hash function in the signature validation for microcode updates; researchers released a proof of concept update which makes the RDRAND instruction return 4plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAMD Zen 1 through Zen 4 CPUs use an insecure hash function in the signature validation for microcode updates; researchers released a proof of concept update which makes the RDRAND instruction return 4plus-squaregithub.comArthur Besse@lemmy.mlEnglish · edit-22 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoWhatsApp says journalists and civil society members were targets of Israeli spywareplus-squarewww.theguardian.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhatsApp says journalists and civil society members were targets of Israeli spywareplus-squarewww.theguardian.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink
Zerush@lemmy.ml · 3 months agoSeized Cracked.io, Nulled.to hacking forums in Operation Talentplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSeized Cracked.io, Nulled.to hacking forums in Operation Talentplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 3 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoApple chips can be hacked to leak secrets from Gmail, iCloud, and moreplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple chips can be hacked to leak secrets from Gmail, iCloud, and moreplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoHacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panelplus-squaresamcurry.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panelplus-squaresamcurry.net☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink