Regularly updated Hugging Face datasets and models for software vulnerabilities
(huggingface.co)
in security@lemmy.ml from cedric@lemmy.ml on 09 Mar 21:22
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 09 Mar 21:22
comments (0)
LLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headed
(www.vulnerability-lookup.org)
in security@lemmy.ml from cedric@lemmy.ml on 26 Feb 23:24
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 26 Feb 23:24
comments (0)
two OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled `VerifyHostKeyDNS`, the other allowed pre-auth DoS
(blog.qualys.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 21 Feb 21:49
comments (0)
in security@lemmy.ml from cypherpunks@lemmy.ml on 21 Feb 21:49
comments (0)
VSCode’s SSH Agent Is Bananas
(fly.io)
in security@lemmy.ml from yogthos@lemmy.ml on 08 Feb 2025 15:35
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 08 Feb 2025 15:35
comments (0)
Violet Blue: America’s unfolding cybersecurity catastrophe
(medium.com)
in security@lemmy.ml from davel@lemmy.ml on 08 Feb 2025 04:27
comments (1)
in security@lemmy.ml from davel@lemmy.ml on 08 Feb 2025 04:27
comments (1)
Track vulnerabilities with product watch lists and email notifications
(vulnerability.circl.lu)
in security@lemmy.ml from cedric@lemmy.ml on 07 Feb 2025 11:34
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 07 Feb 2025 11:34
comments (0)
AMD Zen 1 through Zen 4 CPUs use an insecure hash function in the signature validation for microcode updates; researchers released a proof of concept update which makes the RDRAND instruction return 4
(github.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 04 Feb 2025 02:55
comments (8)
in security@lemmy.ml from cypherpunks@lemmy.ml on 04 Feb 2025 02:55
comments (8)
WhatsApp says journalists and civil society members were targets of Israeli spyware
(www.theguardian.com)
in security@lemmy.ml from yogthos@lemmy.ml on 01 Feb 2025 01:35
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 01 Feb 2025 01:35
comments (0)
Seized Cracked.io, Nulled.to hacking forums in Operation Talent
(www.bleepingcomputer.com)
in security@lemmy.ml from Zerush@lemmy.ml on 30 Jan 2025 12:46
comments (0)
in security@lemmy.ml from Zerush@lemmy.ml on 30 Jan 2025 12:46
comments (0)
Apple chips can be hacked to leak secrets from Gmail, iCloud, and more
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 29 Jan 2025 02:28
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 29 Jan 2025 02:28
comments (1)
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel
(samcurry.net)
in security@lemmy.ml from yogthos@lemmy.ml on 23 Jan 2025 18:51
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 23 Jan 2025 18:51
comments (1)
The Shadowserver Foundation Honeypot Feed is now integrated as a source of sightings in Vulnerability-Lookup
(www.vulnerability-lookup.org)
in security@lemmy.ml from cedric@lemmy.ml on 22 Jan 2025 23:09
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 22 Jan 2025 23:09
comments (0)
The Shadowserver Foundation Honeypot Feed is now integrated as a source of sightings in Vulnerability-Lookup
(www.vulnerability-lookup.org)
in security@lemmy.ml from cedric@lemmy.ml on 22 Jan 2025 23:09
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 22 Jan 2025 23:09
comments (0)
Hackers leak 500,000 VPN passwords
(www.youtube.com)
in security@lemmy.ml from yogthos@lemmy.ml on 21 Jan 2025 22:14
comments (3)
in security@lemmy.ml from yogthos@lemmy.ml on 21 Jan 2025 22:14
comments (3)
Vulnerability-Lookup 2.2.0
in security@lemmy.ml from cedric@lemmy.ml on 29 Nov 2024 06:58
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 29 Nov 2024 06:58
comments (0)
Spies hack Wi-Fi networks in far-off land to launch attack on target next door
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 24 Nov 2024 15:17
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 24 Nov 2024 15:17
comments (0)
Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock
(www.404media.co)
in security@lemmy.ml from yogthos@lemmy.ml on 20 Nov 2024 03:47
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 20 Nov 2024 03:47
comments (0)
New Glove infostealer malware bypasses Chrome’s cookie encryption
(www.bleepingcomputer.com)
in security@lemmy.ml from yogthos@lemmy.ml on 14 Nov 2024 22:05
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 14 Nov 2024 22:05
comments (0)
Looking for Lemmy accounts about software vulnerabilities, CVEs, etc.
in security@lemmy.ml from cedric@lemmy.ml on 01 Nov 2024 21:31
comments (1)
in security@lemmy.ml from cedric@lemmy.ml on 01 Nov 2024 21:31
comments (1)
shopping issue
in security@lemmy.ml from Tender@lemmy.dbzer0.com on 01 Nov 2024 16:01
comments (11)
in security@lemmy.ml from Tender@lemmy.dbzer0.com on 01 Nov 2024 16:01
comments (11)
Chinese researchers break RSA encryption with a quantum computer
(www.csoonline.com)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Oct 2024 17:36
comments (2)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Oct 2024 17:36
comments (2)
European govt air-gapped systems breached using custom malware
(www.bleepingcomputer.com)
in security@lemmy.ml from yogthos@lemmy.ml on 09 Oct 2024 22:39
comments (4)
in security@lemmy.ml from yogthos@lemmy.ml on 09 Oct 2024 22:39
comments (4)
Linux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)
(www.youtube.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 20 Sep 2024 13:07
comments (0)
in security@lemmy.ml from cypherpunks@lemmy.ml on 20 Sep 2024 13:07
comments (0)
Vulnerability Lookup 1.5.0
in security@lemmy.ml from cedric@lemmy.ml on 03 Sep 2024 07:25
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 03 Sep 2024 07:25
comments (0)
"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"
(xcancel.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 27 Aug 2024 09:16
comments (0)
in security@lemmy.ml from cypherpunks@lemmy.ml on 27 Aug 2024 09:16
comments (0)
Wihkum - Emergency Response App for Schools in 2024
(wihkum.com)
in security@lemmy.ml from wihkum@lemmy.today on 26 Aug 2024 07:49
comments (1)
in security@lemmy.ml from wihkum@lemmy.today on 26 Aug 2024 07:49
comments (1)
ONNX Bot Tool Hijacks Microsoft 365 accounts & Even Bypass 2FA
(cybersecuritynews.com)
in security@lemmy.ml from yogthos@lemmy.ml on 20 Aug 2024 04:43
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 20 Aug 2024 04:43
comments (0)
iVerify found stock Google Pixel devices' app "showcase" With Excessive System Privileges, Including Remote Code Execution
(iverify.io)
in security@lemmy.ml from yogthos@lemmy.ml on 17 Aug 2024 16:10
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 17 Aug 2024 16:10
comments (1)
Israeli contractor claims Israel is behind rigging elections and online bot farms.Not China, not russia, not iran.They claim Israel has rigged more than 30 elections
(x.com)
in security@lemmy.ml from europathelastbattle@infosec.pub on 14 Aug 2024 18:32
comments (0)
in security@lemmy.ml from europathelastbattle@infosec.pub on 14 Aug 2024 18:32
comments (0)
0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices
(thehackernews.com)
in security@lemmy.ml from yogthos@lemmy.ml on 11 Aug 2024 14:55
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 11 Aug 2024 14:55
comments (0)
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
(www.microsoft.com)
in security@lemmy.ml from yogthos@lemmy.ml on 30 Jul 2024 14:13
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 30 Jul 2024 14:13
comments (0)
Signal downplays encryption key flaw, fixes it after X drama
(www.bleepingcomputer.com)
in security@lemmy.ml from yogthos@lemmy.ml on 21 Jul 2024 03:24
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 21 Jul 2024 03:24
comments (0)
Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.
(github.com)
in security@lemmy.ml from cedric@lemmy.ml on 16 Jul 2024 14:19
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 16 Jul 2024 14:19
comments (0)
CVE-2024-6409: OpenSSH: Possible remote code execution in privsep child
(www.openwall.com)
in security@lemmy.ml from yogthos@lemmy.ml on 09 Jul 2024 17:25
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 09 Jul 2024 17:25
comments (0)
How to avoid phishing fraud scam
in security@lemmy.ml from hetzlemmingsworld@lemmings.world on 30 Jun 2024 08:01
comments (0)
in security@lemmy.ml from hetzlemmingsworld@lemmings.world on 30 Jun 2024 08:01
comments (0)
Firmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save you
(www.tomshardware.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 23 Jun 2024 13:44
comments (2)
in security@lemmy.ml from cypherpunks@lemmy.ml on 23 Jun 2024 13:44
comments (2)
New Wi-Fi Takeover Attack—All Windows Users Warned To Update Now
(www.forbes.com)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Jun 2024 04:11
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Jun 2024 04:11
comments (1)
BusKill Warrant Canary for 2024 H2 🕵️
(www.buskill.in)
in security@lemmy.ml from buskill@lemmy.kde.social on 12 Jun 2024 19:57
comments (0)
in security@lemmy.ml from buskill@lemmy.kde.social on 12 Jun 2024 19:57
comments (0)
The iPhone Setting Thieves Use to Lock You Out of Your Apple Account
(www.wsj.com)
in security@lemmy.ml from yogthos@lemmy.ml on 11 Jun 2024 15:14
comments (3)
in security@lemmy.ml from yogthos@lemmy.ml on 11 Jun 2024 15:14
comments (3)
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
(samcurry.net)
in security@lemmy.ml from lemmyreader@lemmy.ml on 04 Jun 2024 18:45
comments (0)
in security@lemmy.ml from lemmyreader@lemmy.ml on 04 Jun 2024 18:45
comments (0)
Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.
(doublepulsar.com)
in security@lemmy.ml from yogthos@lemmy.ml on 01 Jun 2024 00:28
comments (3)
in security@lemmy.ml from yogthos@lemmy.ml on 01 Jun 2024 00:28
comments (3)
Federal agency warns critical Linux vulnerability being actively exploited
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 31 May 2024 21:06
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 31 May 2024 21:06
comments (0)
Securing a computer?
in security@lemmy.ml from rando895@lemmygrad.ml on 30 May 2024 19:11
comments (3)
in security@lemmy.ml from rando895@lemmygrad.ml on 30 May 2024 19:11
comments (3)
This Undisclosed WhatsApp Vulnerability Lets Governments See Who You Message
(theintercept.com)
in security@lemmy.ml from yogthos@lemmy.ml on 23 May 2024 02:57
comments (2)
in security@lemmy.ml from yogthos@lemmy.ml on 23 May 2024 02:57
comments (2)
Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution
(github.com)
in security@lemmy.ml from yogthos@lemmy.ml on 22 May 2024 01:21
comments (2)
in security@lemmy.ml from yogthos@lemmy.ml on 22 May 2024 01:21
comments (2)
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
(thehackernews.com)
in security@lemmy.ml from yogthos@lemmy.ml on 19 May 2024 04:29
comments (2)
in security@lemmy.ml from yogthos@lemmy.ml on 19 May 2024 04:29
comments (2)
How I upgraded my water heater and discovered how bad smart home security can be
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 19 May 2024 00:28
comments (4)
in security@lemmy.ml from yogthos@lemmy.ml on 19 May 2024 00:28
comments (4)
BIMI and DMARC Can't Save You: The Overlooked DKIM Exploit
(www.zone.eu)
in security@lemmy.ml from lemmyreader@lemmy.ml on 18 May 2024 13:24
comments (4)
in security@lemmy.ml from lemmyreader@lemmy.ml on 18 May 2024 13:24
comments (4)
16 years of CVE-2008-0166 - Debian OpenSSL Bug
(16years.secvuln.info)
in security@lemmy.ml from lemmyreader@lemmy.ml on 12 May 2024 12:11
comments (0)
in security@lemmy.ml from lemmyreader@lemmy.ml on 12 May 2024 12:11
comments (0)
Novel attack against virtually all VPN apps neuters their entire purpose
(arstechnica.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 07 May 2024 15:43
comments (23)
in security@lemmy.ml from cypherpunks@lemmy.ml on 07 May 2024 15:43
comments (23)
How well can an employer be certain of a remote employee's geographical location?
in security@lemmy.ml from maegul@lemmy.ml on 03 May 2024 06:15
comments (3)
in security@lemmy.ml from maegul@lemmy.ml on 03 May 2024 06:15
comments (3)
Stealing your Telegram account in 10 seconds flat
(lyra.horse)
in security@lemmy.ml from lemmyreader@lemmy.ml on 02 May 2024 23:10
comments (0)
in security@lemmy.ml from lemmyreader@lemmy.ml on 02 May 2024 23:10
comments (0)
Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 29 Apr 2024 14:37
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 29 Apr 2024 14:37
comments (1)
A doubt in encryption
in security@lemmy.ml from t0mri@lemmy.ml on 28 Apr 2024 06:16
comments (28)
in security@lemmy.ml from t0mri@lemmy.ml on 28 Apr 2024 06:16
comments (28)
Computer scientists unveil novel attacks on cybersecurity
(www.sciencedaily.com)
in security@lemmy.ml from lemmyreader@lemmy.ml on 27 Apr 2024 09:43
comments (1)
in security@lemmy.ml from lemmyreader@lemmy.ml on 27 Apr 2024 09:43
comments (1)
Passkeys: A Shattered Dream
(fy.blackhats.net.au)
in security@lemmy.ml from lemmyreader@lemmy.ml on 26 Apr 2024 09:28
comments (5)
in security@lemmy.ml from lemmyreader@lemmy.ml on 26 Apr 2024 09:28
comments (5)
A dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHub
(mastodon.social)
in security@lemmy.ml from yogthos@lemmy.ml on 18 Apr 2024 16:32
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 18 Apr 2024 16:32
comments (0)
After XZ Utils, More Open-Source Maintainers Under Attack
(www.bankinfosecurity.com)
in security@lemmy.ml from lemmyreader@lemmy.ml on 17 Apr 2024 00:07
comments (1)
in security@lemmy.ml from lemmyreader@lemmy.ml on 17 Apr 2024 00:07
comments (1)
PuTTY priority high vulnerability CVE-2024-31497
(hachyderm.io)
in security@lemmy.ml from lemmyreader@lemmy.ml on 15 Apr 2024 22:02
comments (3)
in security@lemmy.ml from lemmyreader@lemmy.ml on 15 Apr 2024 22:02
comments (3)
Gmail And YouTube Hackers Bypass Google’s 2FA Account Security
(www.forbes.com)
in security@lemmy.ml from yogthos@lemmy.ml on 14 Apr 2024 02:48
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 14 Apr 2024 02:48
comments (1)
New Technique Detected in an Open Source Supply Chain Attack
(checkmarx.com)
in security@lemmy.ml from lemmyreader@lemmy.ml on 12 Apr 2024 14:36
comments (1)
in security@lemmy.ml from lemmyreader@lemmy.ml on 12 Apr 2024 14:36
comments (1)
New Spectre v2 attack impacts Linux systems on Intel CPUs
(www.bleepingcomputer.com)
in security@lemmy.ml from lemmyreader@lemmy.ml on 10 Apr 2024 23:59
comments (0)
in security@lemmy.ml from lemmyreader@lemmy.ml on 10 Apr 2024 23:59
comments (0)
Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them
(www.flux.utah.edu)
in security@lemmy.ml from lemmyreader@lemmy.ml on 10 Apr 2024 20:09
comments (0)
in security@lemmy.ml from lemmyreader@lemmy.ml on 10 Apr 2024 20:09
comments (0)
Running the “Reflections on Trusting Trust” Compiler
(research.swtch.com)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 15:15
comments (0)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 15:15
comments (0)
The Bootstrapping Exam: Escaping from “Trusting Trust”
(www.devever.net)
in security@lemmy.ml from cypherpunks@lemmy.ml on 10 Apr 2024 14:18
comments (1)
in security@lemmy.ml from cypherpunks@lemmy.ml on 10 Apr 2024 14:18
comments (1)
GParted Live Is Now Patched Against the XZ Backdoor, Powered by Linux Kernel 6.7
(9to5linux.com)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:28
comments (0)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:28
comments (0)
Thoughts on the xz backdoor: an lzma-rs perspective | Blog
(gendignoux.com)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:27
comments (2)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:27
comments (2)
Security advisory for the standard library (CVE-2024-24576)
(blog.rust-lang.org)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:27
comments (0)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:27
comments (0)
Critical Rust flaw enables Windows command injection attacks
(www.bleepingcomputer.com)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:26
comments (0)
in security@lemmy.ml from Rustmilian@lemmy.world on 10 Apr 2024 11:26
comments (0)
XZ Utils backdoor - Wikipedia
(en.wikipedia.org)
in security@lemmy.ml from lemmyreader@lemmy.ml on 08 Apr 2024 20:21
comments (0)
in security@lemmy.ml from lemmyreader@lemmy.ml on 08 Apr 2024 20:21
comments (0)
Today marks the 10th anniversary of the Heartbleed vulnerability in OpenSSL, which had the same ultimate root cause as recent XZUtils backdoor incident
(medium.com)
in security@lemmy.ml from otto@programming.dev on 07 Apr 2024 20:56
comments (1)
in security@lemmy.ml from otto@programming.dev on 07 Apr 2024 20:56
comments (1)
Amazon storing classified US government documents improperly
in security@lemmy.ml from lemmyreader@lemmy.ml on 07 Apr 2024 18:10
comments (80)
in security@lemmy.ml from lemmyreader@lemmy.ml on 07 Apr 2024 18:10
comments (80)
AI bots hallucinate software packages and devs download them - even if potentially poisoned with malware
(www.theregister.com)
in cybersecurity@infosec.pub from mozz@mbin.grits.dev on 01 Apr 2024 20:15
comments (0)
in cybersecurity@infosec.pub from mozz@mbin.grits.dev on 01 Apr 2024 20:15
comments (0)
backdoor in upstream xz/liblzma leading to ssh server compromise
(www.openwall.com)
in security@lemmy.ml from Atemu@lemmy.ml on 29 Mar 2024 17:35
comments (0)
in security@lemmy.ml from Atemu@lemmy.ml on 29 Mar 2024 17:35
comments (0)
High Court orders temporary suspension of Telegram's services in Spain
(www.reuters.com)
in security@lemmy.ml from Ninjazzon@infosec.pub on 24 Mar 2024 07:00
comments (1)
in security@lemmy.ml from Ninjazzon@infosec.pub on 24 Mar 2024 07:00
comments (1)
SIM swappers hijacking phone numbers in eSIM attacks
(www.bleepingcomputer.com)
in security@lemmy.ml from overflow64@lemmy.ml on 15 Mar 2024 17:47
comments (0)
in security@lemmy.ml from overflow64@lemmy.ml on 15 Mar 2024 17:47
comments (0)
Debunking the Myth of “Anonymous” Data
(www.eff.org)
in security@lemmy.ml from Ninjazzon@infosec.pub on 03 Mar 2024 07:49
comments (4)
in security@lemmy.ml from Ninjazzon@infosec.pub on 03 Mar 2024 07:49
comments (4)
Researchers create AI worms that can spread from one system to another
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 02 Mar 2024 14:57
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 02 Mar 2024 14:57
comments (0)
How the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putin
(www.wired.com)
in security@lemmy.ml from Ninjazzon@infosec.pub on 29 Feb 2024 09:34
comments (7)
in security@lemmy.ml from Ninjazzon@infosec.pub on 29 Feb 2024 09:34
comments (7)
NIST Releases Version 2.0 of Landmark Cybersecurity Framework
(www.nist.gov)
in security@lemmy.ml from wizardbeard@lemmy.dbzer0.com on 28 Feb 2024 14:26
comments (0)
in security@lemmy.ml from wizardbeard@lemmy.dbzer0.com on 28 Feb 2024 14:26
comments (0)
Vehicle thefts - Insecure vehicles should be banned, not security tools like the Flipper Zero
(saveflipper.ca)
in security@lemmy.ml from Ninjazzon@infosec.pub on 27 Feb 2024 17:46
comments (11)
in security@lemmy.ml from Ninjazzon@infosec.pub on 27 Feb 2024 17:46
comments (11)
Security List
(security-list.js.org)
in security@lemmy.ml from Ninjazzon@infosec.pub on 26 Feb 2024 11:17
comments (2)
in security@lemmy.ml from Ninjazzon@infosec.pub on 26 Feb 2024 11:17
comments (2)
Things that have been happening to me too often lately
in security@lemmy.ml from tux0r@feddit.de on 23 Feb 2024 21:04
comments (7)
in security@lemmy.ml from tux0r@feddit.de on 23 Feb 2024 21:04
comments (7)
If the Internet where to be redesigned, what would you change to improve security?
in security@lemmy.ml from FlappyBubble@lemmy.ml on 18 Feb 2024 19:50
comments (5)
in security@lemmy.ml from FlappyBubble@lemmy.ml on 18 Feb 2024 19:50
comments (5)
Why Bloat Is Still Software’s Biggest Vulnerability
(spectrum.ieee.org)
in security@lemmy.ml from Ninjazzon@infosec.pub on 15 Feb 2024 15:47
comments (0)
in security@lemmy.ml from Ninjazzon@infosec.pub on 15 Feb 2024 15:47
comments (0)
This iOS Trojan Is Harvesting Facial-Recognition Data
(www.pcmag.com)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Feb 2024 13:41
comments (3)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Feb 2024 13:41
comments (3)
Critical Outlook RCE with CVSS3.1 (badness) score of 9.8
(infosec.exchange)
in security@lemmy.ml from Helix@feddit.de on 15 Feb 2024 04:06
comments (0)
in security@lemmy.ml from Helix@feddit.de on 15 Feb 2024 04:06
comments (0)
Twilio Authy Desktop app, new death date
in security@lemmy.ml from FirstCircle@lemmy.ml on 13 Feb 2024 20:21
comments (3)
in security@lemmy.ml from FirstCircle@lemmy.ml on 13 Feb 2024 20:21
comments (3)
Nearly half the French population have data nabbed in massive breach
(www.theregister.com)
in security@lemmy.ml from Ninjazzon@infosec.pub on 12 Feb 2024 10:24
comments (4)
in security@lemmy.ml from Ninjazzon@infosec.pub on 12 Feb 2024 10:24
comments (4)
Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade
(thehackernews.com)
in security@lemmy.ml from Ninjazzon@infosec.pub on 08 Feb 2024 14:55
comments (1)
in security@lemmy.ml from Ninjazzon@infosec.pub on 08 Feb 2024 14:55
comments (1)
Linux Foundation Launches Initiative to Advance Post-Quantum Cryptography | L...
(linuxsecurity.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 08 Feb 2024 01:00
comments (1)
in security@lemmy.ml from BlanK0@lemmy.ml on 08 Feb 2024 01:00
comments (1)
GitHub - MISP/MISP: MISP (core software) - Open Source Threat Intelligence and Sharing Platform
(github.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 07 Feb 2024 16:32
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 07 Feb 2024 16:32
comments (0)
GitHub - arkime/arkime: Arkime is an open source, large scale, full packet capturing, indexing, and database system.
(github.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 07 Feb 2024 16:29
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 07 Feb 2024 16:29
comments (0)
Critical vulnerability affecting most Linux distros allows for bootkits
(arstechnica.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 07 Feb 2024 16:04
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 07 Feb 2024 16:04
comments (0)
Netherlands reveals Chinese spies attacked its defense dept
(www.theregister.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 06 Feb 2024 21:01
comments (3)
in security@lemmy.ml from BlanK0@lemmy.ml on 06 Feb 2024 21:01
comments (3)
Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 06 Feb 2024 20:56
comments (1)
in security@lemmy.ml from BlanK0@lemmy.ml on 06 Feb 2024 20:56
comments (1)
AnyDesk revokes certs, passwords after IT security breach
(www.theregister.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 23:12
comments (2)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 23:12
comments (2)
Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 23:05
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 23:05
comments (0)
Leaky Vessels flaws allow hackers to escape Docker, runc containers
(www.bleepingcomputer.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 23:01
comments (5)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 23:01
comments (5)
Pegasus Spyware Targeted iPhones of Journalists and Activists in Jordan
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 12:04
comments (1)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 12:04
comments (1)
XOrg Server and Xwayland Patched Against Multiple Security Vulnerabilities | ...
(linuxsecurity.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 12:03
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 05 Feb 2024 12:03
comments (0)
Breaking Bitlocker - Bypassing the Windows Disk Encryption
(www.youtube.com)
in security@lemmy.ml from yogthos@lemmy.ml on 05 Feb 2024 00:11
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 05 Feb 2024 00:11
comments (0)
Tools from EFF's Tech Team
(www.eff.org)
in security@lemmy.ml from Ninjazzon@infosec.pub on 03 Feb 2024 09:00
comments (0)
in security@lemmy.ml from Ninjazzon@infosec.pub on 03 Feb 2024 09:00
comments (0)
Exposed Docker APIs Under Attack in 'Commando Cat' Cryptojacking Campaign
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 02 Feb 2024 01:33
comments (1)
in security@lemmy.ml from BlanK0@lemmy.ml on 02 Feb 2024 01:33
comments (1)
Gitleaks review (repository search for secrets and keys)
(linuxsecurity.expert)
in security@lemmy.ml from BlanK0@lemmy.ml on 02 Feb 2024 01:24
comments (2)
in security@lemmy.ml from BlanK0@lemmy.ml on 02 Feb 2024 01:24
comments (2)
Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 01 Feb 2024 18:22
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 01 Feb 2024 18:22
comments (0)
Mastodon security update: every version prior to today's is vulnerable to remote user impersonation and takeover
(github.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 01 Feb 2024 17:28
comments (0)
in security@lemmy.ml from cypherpunks@lemmy.ml on 01 Feb 2024 17:28
comments (0)
At least 30 journalists, lawyers and activists hacked with Pegasus in Jordan, forensic probe finds
(apnews.com)
in security@lemmy.ml from yogthos@lemmy.ml on 01 Feb 2024 12:55
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 01 Feb 2024 12:55
comments (1)
Defending against the Attack of the Clone[d website]s!
(blog.thinkst.com)
in security@lemmy.ml from ranok@sopuli.xyz on 31 Jan 2024 19:48
comments (1)
in security@lemmy.ml from ranok@sopuli.xyz on 31 Jan 2024 19:48
comments (1)
Ntopng review
(linuxsecurity.expert)
in security@lemmy.ml from BlanK0@lemmy.ml on 31 Jan 2024 14:26
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 31 Jan 2024 14:26
comments (0)
Root access vulnerability in glibc library impacts many Linux distros
(securityaffairs.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 31 Jan 2024 12:17
comments (3)
in security@lemmy.ml from BlanK0@lemmy.ml on 31 Jan 2024 12:17
comments (3)
URGENT: Upgrade GitLab - Critical Workspace Creation Flaw Allows File Overwrite
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 30 Jan 2024 18:01
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 30 Jan 2024 18:01
comments (0)
Riding the AI Waves: The Rise of Artificial Intelligence to Combat Cyber Threats
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 29 Jan 2024 19:30
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 29 Jan 2024 19:30
comments (0)
Cve-search review (local CVE and CPE database)
(linuxsecurity.expert)
in security@lemmy.ml from BlanK0@lemmy.ml on 29 Jan 2024 19:12
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 29 Jan 2024 19:12
comments (0)
Perfecting the Defense-in-Depth Strategy with Automation
(thehackernews.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 28 Jan 2024 20:37
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 28 Jan 2024 20:37
comments (0)
Linux Kernel 6.7 Released with Various Security Improvements | LinuxSecurity.com
(linuxsecurity.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 27 Jan 2024 21:27
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 27 Jan 2024 21:27
comments (0)
The Parrot OS 6.0 Release: Empowering Ethical Hackers with Cutting-edge Tools...
(linuxsecurity.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 27 Jan 2024 21:26
comments (2)
in security@lemmy.ml from BlanK0@lemmy.ml on 27 Jan 2024 21:26
comments (2)
The Linux Threat Landscape Report - Security News
(www.trendmicro.com)
in security@lemmy.ml from BlanK0@lemmy.ml on 27 Jan 2024 18:52
comments (0)
in security@lemmy.ml from BlanK0@lemmy.ml on 27 Jan 2024 18:52
comments (0)
In major gaffe, hacked Microsoft test account was assigned admin privileges
(arstechnica.com)
in security@lemmy.ml from canpolat@programming.dev on 27 Jan 2024 07:54
comments (3)
in security@lemmy.ml from canpolat@programming.dev on 27 Jan 2024 07:54
comments (3)
BusKill Warrant Canary #007 🕵️
(www.buskill.in)
in security@lemmy.ml from maltfield@monero.town on 21 Jan 2024 18:45
comments (0)
in security@lemmy.ml from maltfield@monero.town on 21 Jan 2024 18:45
comments (0)
Apple iMessage Soundly Beaten As Powerful New Update Suddenly Leaks
(www.forbes.com)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Jan 2024 21:57
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 15 Jan 2024 21:57
comments (1)
Widespread Weak Keys in Network Devices - factorable.net
(factorable.net)
in security@lemmy.ml from overflow64@lemmy.ml on 15 Jan 2024 00:39
comments (0)
in security@lemmy.ml from overflow64@lemmy.ml on 15 Jan 2024 00:39
comments (0)
Organic maps which claims to be ad-free was marked by F-Droid as “Containing ads”
in security@lemmy.ml from PrivacyAdd@discuss.tchncs.de on 13 Jan 2024 22:33
comments (3)
in security@lemmy.ml from PrivacyAdd@discuss.tchncs.de on 13 Jan 2024 22:33
comments (3)
Hackers can infect network-connected wrenches to install ransomware
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 09 Jan 2024 16:08
comments (2)
in security@lemmy.ml from yogthos@lemmy.ml on 09 Jan 2024 16:08
comments (2)
BlockThreat Newsletter - 2023 Week 52
(youtube.com)
in security@lemmy.ml from overflow64@lemmy.ml on 06 Jan 2024 13:40
comments (0)
in security@lemmy.ml from overflow64@lemmy.ml on 06 Jan 2024 13:40
comments (0)
Grave flaws in BGP Error handling
(blog.benjojo.co.uk)
in cloudsec@azorius.net from stsp@azorius.net on 29 Aug 2023 14:31
comments (1)
in cloudsec@azorius.net from stsp@azorius.net on 29 Aug 2023 14:31
comments (1)
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords
(blog.redteam-pentesting.de)
in security@lemmy.ml from pimterry@lemmy.world on 03 Jan 2024 16:07
comments (1)
in security@lemmy.ml from pimterry@lemmy.world on 03 Jan 2024 16:07
comments (1)
Mobile reverse engineering to empower the gig economy workers and labor unions
(media.ccc.de)
in security@lemmy.ml from chobeat@lemmy.ml on 02 Jan 2024 14:54
comments (0)
in security@lemmy.ml from chobeat@lemmy.ml on 02 Jan 2024 14:54
comments (0)
It is possible to extract encryption keys by recording coil whine with a phone next to the computer (2013 paper)
(web.archive.org)
in security@lemmy.ml from HiddenLayer5@lemmy.ml on 01 Jan 2024 10:00
comments (7)
in security@lemmy.ml from HiddenLayer5@lemmy.ml on 01 Jan 2024 10:00
comments (7)
Comcast Xfinity data breach affects over 35 million people
(www.theverge.com)
in security@lemmy.ml from yogthos@lemmy.ml on 31 Dec 2023 15:47
comments (2)
in security@lemmy.ml from yogthos@lemmy.ml on 31 Dec 2023 15:47
comments (2)
Unicode tricks in pull requests: Do review tools warn us?
(semanticdiff.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 19 Dec 2023 14:14
comments (0)
in security@lemmy.ml from cypherpunks@lemmy.ml on 19 Dec 2023 14:14
comments (0)
How worried should we be about the “AutoSpill” credential leak in Android password managers?
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 13 Dec 2023 16:33
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 13 Dec 2023 16:33
comments (1)
Insecure Password allowed Administrative Access to Electric Vehicle Chargers
(industrydecarbonization.com)
in security@lemmy.ml from hanno@lemmy.world on 04 Dec 2023 19:16
comments (4)
in security@lemmy.ml from hanno@lemmy.world on 04 Dec 2023 19:16
comments (4)
How do you manage your different encrypted files/storages?
in security@lemmy.ml from retiolus@lemmy.cat on 27 Nov 2023 09:52
comments (1)
in security@lemmy.ml from retiolus@lemmy.cat on 27 Nov 2023 09:52
comments (1)
Intel fixes high-severity CPU bug that causes “very strange behavior”
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 14 Nov 2023 22:04
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 14 Nov 2023 22:04
comments (1)
Q3'23 ThinkstScapes info sec research review
(s3.eu-west-1.amazonaws.com)
in security@lemmy.ml from ranok@sopuli.xyz on 14 Nov 2023 16:35
comments (0)
in security@lemmy.ml from ranok@sopuli.xyz on 14 Nov 2023 16:35
comments (0)
Warning: New Outlook sends passwords, mails and other data to Microsoft
(mailbox.org)
in security@lemmy.ml from yogthos@lemmy.ml on 10 Nov 2023 21:31
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 10 Nov 2023 21:31
comments (0)
Flipper Zero gadget that DoSes iPhones takes once-esoteric attacks mainstream. No cure yet for a popular iPhone attack, except for turning off Bluetooth.
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 02 Nov 2023 12:20
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 02 Nov 2023 12:20
comments (1)
A HIDS written in Python
(github.com)
in security@lemmy.ml from cedric@lemmy.ml on 31 Oct 2023 11:56
comments (0)
in security@lemmy.ml from cedric@lemmy.ml on 31 Oct 2023 11:56
comments (0)
Microsoft Account's OAuth tokens leaking via open redirect in Harvest App"
(eval.blog)
in security@lemmy.ml from yogthos@lemmy.ml on 22 Oct 2023 16:01
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 22 Oct 2023 16:01
comments (0)
"[31m"?! ANSI Terminal security in 2023 and finding 10 CVEs
(dgl.cx)
in security@lemmy.ml from cypherpunks@lemmy.ml on 21 Oct 2023 20:07
comments (0)
in security@lemmy.ml from cypherpunks@lemmy.ml on 21 Oct 2023 20:07
comments (0)
Encrypted traffic interception on Hetzner and Linode targeting the largest Russian XMPP (Jabber) messaging service —
(notes.valdikss.org.ru)
in security@lemmy.ml from Eikichi@lemmy.ml on 21 Oct 2023 09:18
comments (0)
in security@lemmy.ml from Eikichi@lemmy.ml on 21 Oct 2023 09:18
comments (0)
Okta says hackers breached its support system and viewed customer files
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 21 Oct 2023 01:31
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 21 Oct 2023 01:31
comments (1)
The Fake Browser Update Scam Gets a Makeover
(krebsonsecurity.com)
in security@lemmy.ml from yogthos@lemmy.ml on 19 Oct 2023 18:29
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 19 Oct 2023 18:29
comments (0)
Severity HIGH security problem in curl to be announced with curl 8.4.0 on Oct 11
(github.com)
in security@lemmy.ml from yogthos@lemmy.ml on 04 Oct 2023 19:59
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 04 Oct 2023 19:59
comments (1)
A local root vulnerability in glibc (disclosed 3 October 2023)
(lwn.net)
in security@lemmy.ml from cypherpunks@lemmy.ml on 04 Oct 2023 08:37
comments (1)
in security@lemmy.ml from cypherpunks@lemmy.ml on 04 Oct 2023 08:37
comments (1)
KeePassDX | F-Droid - Free and Open Source Android App Repository
(f-droid.org)
in security@lemmy.ml from naut@infosec.pub on 30 Sep 2023 19:47
comments (0)
in security@lemmy.ml from naut@infosec.pub on 30 Sep 2023 19:47
comments (0)
Sidechannel pixel-stealing attack works in Chromium on all modern GPUs
(arstechnica.com)
in security@lemmy.ml from yogthos@lemmy.ml on 26 Sep 2023 23:04
comments (1)
in security@lemmy.ml from yogthos@lemmy.ml on 26 Sep 2023 23:04
comments (1)
GPUs from all major suppliers are vulnerable to new pixel-stealing attack
(arstechnica.com)
in security@lemmy.ml from cypherpunks@lemmy.ml on 26 Sep 2023 20:49
comments (3)
in security@lemmy.ml from cypherpunks@lemmy.ml on 26 Sep 2023 20:49
comments (3)
Rezilion Researchers Uncover New Details on Severity of Google Chrome Zero-Day Vulnerability (CVE-2023-4863)
(www.rezilion.com)
in security@lemmy.ml from yogthos@lemmy.ml on 22 Sep 2023 20:16
comments (0)
in security@lemmy.ml from yogthos@lemmy.ml on 22 Sep 2023 20:16
comments (0)
PSA: a recently-fixed image parsing vulnerability in Chrome (and things that use Chrome, such as Electron apps) is being actively exploited in the wild. install your updates!
(nvd.nist.gov)
in security@lemmy.ml from cypherpunks@lemmy.ml on 15 Sep 2023 14:22
comments (0)
in security@lemmy.ml from cypherpunks@lemmy.ml on 15 Sep 2023 14:22
comments (0)
From Terminal Output to Arbitrary Remote Code Execution
(blog.solidsnail.com)
in security@lemmy.ml from solidsnail@infosec.pub on 12 Sep 2023 21:31
comments (4)
in security@lemmy.ml from solidsnail@infosec.pub on 12 Sep 2023 21:31
comments (4)