floofloof@lemmy.ca · 1 day agoIran claims US exploited networking equipment backdoors during strikesplus-squarewww.tomshardware.comexternal-linkmessage-square1linkfedilinkarrow-up151arrow-down12
arrow-up149arrow-down1external-linkIran claims US exploited networking equipment backdoors during strikesplus-squarewww.tomshardware.comfloofloof@lemmy.ca · 1 day agomessage-square1linkfedilink
shellsharksMA · 1 day agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharksMA · 1 day agomessage-square1linkfedilink
randomname@scribe.disroot.org · 1 day agoIran, Russia and China behind most major cyberattacks on UK, security chief warnsplus-squarewww.the-independent.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkIran, Russia and China behind most major cyberattacks on UK, security chief warnsplus-squarewww.the-independent.comrandomname@scribe.disroot.org · 1 day agomessage-square0linkfedilink
monica_b1998@lemmy.world · 2 days agoWireshark tutorial: Capture vs. Display Filtersplus-squareslicker.meexternal-linkmessage-square1linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkWireshark tutorial: Capture vs. Display Filtersplus-squareslicker.memonica_b1998@lemmy.world · 2 days agomessage-square1linkfedilink
cm0002@libretechni.ca · 2 days agoQuantum Computers Are Not a Threat to 128-bit Symmetric Keysplus-squarewords.filippo.ioexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down12
arrow-up19arrow-down1external-linkQuantum Computers Are Not a Threat to 128-bit Symmetric Keysplus-squarewords.filippo.iocm0002@libretechni.ca · 2 days agomessage-square0linkfedilink
cm0002@libretechni.ca · 4 days agoMicrosoft's Silent Lockout: Why WireGuard, VeraCrypt & Windscribe Can No Longer Update Windows Usersplus-squaretechlore.techexternal-linkmessage-square8linkfedilinkarrow-up177arrow-down17
arrow-up170arrow-down1external-linkMicrosoft's Silent Lockout: Why WireGuard, VeraCrypt & Windscribe Can No Longer Update Windows Usersplus-squaretechlore.techcm0002@libretechni.ca · 4 days agomessage-square8linkfedilink
beep@piefed.worldEnglish · 3 days agoFakeWallet cryptostealer propagating via iOS App Store applicationsplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkFakeWallet cryptostealer propagating via iOS App Store applicationsplus-squaresecurelist.combeep@piefed.worldEnglish · 3 days agomessage-square0linkfedilink
monica_b1998@lemmy.world · 6 days agoThree Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatchedplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up180arrow-down10
arrow-up180arrow-down1external-linkThree Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatchedplus-squarethehackernews.commonica_b1998@lemmy.world · 6 days agomessage-square0linkfedilink
beep@piefed.worldEnglish · 7 days agoEU’s official age verification app found exposing sensitive user data; also EU Age Verification can be bypassed using their own infrastructureplus-squarevideo.twimg.comvideomessage-square3linkfedilinkarrow-up192arrow-down12
arrow-up190arrow-down1videoEU’s official age verification app found exposing sensitive user data; also EU Age Verification can be bypassed using their own infrastructureplus-squarevideo.twimg.combeep@piefed.worldEnglish · 7 days agomessage-square3linkfedilink
beep@piefed.worldEnglish · 5 days agoHTTP desync in Discord's media proxy: Spying on a whole platformplus-squaretmctmt.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkHTTP desync in Discord's media proxy: Spying on a whole platformplus-squaretmctmt.combeep@piefed.worldEnglish · 5 days agomessage-square0linkfedilink
cm0002@lemdro.id · 6 days agoClaude Opus wrote a Chrome exploit for $2,283plus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkClaude Opus wrote a Chrome exploit for $2,283plus-squarewww.theregister.comcm0002@lemdro.id · 6 days agomessage-square1linkfedilink
beep@piefed.worldEnglish · 5 days agoNIST gives up enriching most CVEsplus-squarerisky.bizexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNIST gives up enriching most CVEsplus-squarerisky.bizbeep@piefed.worldEnglish · 5 days agomessage-square0linkfedilink
beep@piefed.worldEnglish · 7 days ago108 Chrome extensions caught stealing user data and hijacking sessionsplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down14
arrow-up110arrow-down1external-link108 Chrome extensions caught stealing user data and hijacking sessionsplus-squaresocket.devbeep@piefed.worldEnglish · 7 days agomessage-square0linkfedilink
beep@piefed.worldEnglish · 7 days agoFiverr left customer files public and searchable on Googleplus-squarenews.ycombinator.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down13
arrow-up16arrow-down1external-linkFiverr left customer files public and searchable on Googleplus-squarenews.ycombinator.combeep@piefed.worldEnglish · 7 days agomessage-square0linkfedilink
shellsharksMA · 6 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareOff-Topic Fridayplus-squareshellsharksMA · 6 days agomessage-square0linkfedilink
cm0002@lemmings.world · 10 days agoSomeone Bought 30 WordPress Plugins and Planted a Backdoor in All of Them.plus-squareanchor.hostexternal-linkmessage-square2linkfedilinkarrow-up136arrow-down11
arrow-up135arrow-down1external-linkSomeone Bought 30 WordPress Plugins and Planted a Backdoor in All of Them.plus-squareanchor.hostcm0002@lemmings.world · 10 days agomessage-square2linkfedilink
cm0002@lemmings.world · 12 days agoAI Cybersecurity After Mythos: The Jagged Frontierplus-squareaisle.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAI Cybersecurity After Mythos: The Jagged Frontierplus-squareaisle.comcm0002@lemmings.world · 12 days agomessage-square0linkfedilink
cm0002@lemmings.world · 12 days agoTwo different attackers poisoned popular open source tools - and showed us the future of supply chain compromiseplus-squarewww.theregister.comexternal-linkmessage-square2linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkTwo different attackers poisoned popular open source tools - and showed us the future of supply chain compromiseplus-squarewww.theregister.comcm0002@lemmings.world · 12 days agomessage-square2linkfedilink
cm0002@lemmings.world · 12 days agoHWMonitor & CPU-Z users were exposed to malware through fake downloads after CPUID breachalternativeto.netexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHWMonitor & CPU-Z users were exposed to malware through fake downloads after CPUID breachalternativeto.netcm0002@lemmings.world · 12 days agomessage-square0linkfedilink
cm0002@lemmings.world · 12 days agoSupply chain nightmare: How Rust will be attacked and what we can do to mitigate the inevitableplus-squarekerkour.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkSupply chain nightmare: How Rust will be attacked and what we can do to mitigate the inevitableplus-squarekerkour.comcm0002@lemmings.world · 12 days agomessage-square0linkfedilink