KissakiEnglish · 2 months agoChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comexternal-linkmessage-square5linkfedilinkarrow-up117arrow-down15
arrow-up112arrow-down1external-linkChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comKissakiEnglish · 2 months agomessage-square5linkfedilink
ProEnglish · 2 months agoDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioProEnglish · 2 months agomessage-square0linkfedilink
ProEnglish · 2 months agoThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govProEnglish · 2 months agomessage-square0linkfedilink
ProEnglish · edit-22 months agoThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govProEnglish · edit-22 months agomessage-square0linkfedilink
ProEnglish · 3 months agoThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comProEnglish · 3 months agomessage-square0linkfedilink
ProEnglish · 3 months agoBackdoor found in popular ecommerce componentsplus-squaresansec.ioexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBackdoor found in popular ecommerce componentsplus-squaresansec.ioProEnglish · 3 months agomessage-square0linkfedilink
ProEnglish · 3 months agoReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comProEnglish · 3 months agomessage-square0linkfedilink
ProEnglish · 3 months ago"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduProEnglish · 3 months agomessage-square0linkfedilink
ProEnglish · 3 months agoA Flaw With the Security Level Slider in Tor Browserplus-squarewww.privacyguides.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkA Flaw With the Security Level Slider in Tor Browserplus-squarewww.privacyguides.orgProEnglish · 3 months agomessage-square0linkfedilink
KissakiEnglish · 3 months agoWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square2linkfedilinkarrow-up119arrow-down14
arrow-up115arrow-down1external-linkWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comKissakiEnglish · 3 months agomessage-square2linkfedilink
KissakiEnglish · edit-23 months agoMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square1linkfedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comKissakiEnglish · edit-23 months agomessage-square1linkfedilink
KissakiEnglish · 3 months agoSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgKissakiEnglish · 3 months agomessage-square0linkfedilink
Nemeski@lemm.eeEnglish · 3 months ago‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comexternal-linkmessage-square15linkfedilinkarrow-up1105arrow-down11
arrow-up1104arrow-down1external-link‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comNemeski@lemm.eeEnglish · 3 months agomessage-square15linkfedilink
cm0002@lemmy.worldEnglish · 4 months agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square3linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comcm0002@lemmy.worldEnglish · 4 months agomessage-square3linkfedilink
cm0002@lemmy.worldEnglish · 6 months agoAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techexternal-linkmessage-square5linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techcm0002@lemmy.worldEnglish · 6 months agomessage-square5linkfedilink
💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱English · 8 months agoHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.com💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱English · 8 months agomessage-square0linkfedilink
ertaiEnglish · 10 months agoCryptography DEEPEST LOREplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkCryptography DEEPEST LOREplus-squaregithub.comertaiEnglish · 10 months agomessage-square0linkfedilink
kryllicEnglish · 11 months agoMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comkryllicEnglish · 11 months agomessage-square1linkfedilink
kryllicEnglish · 11 months ago1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comexternal-linkmessage-square12linkfedilinkarrow-up142arrow-down11
arrow-up141arrow-down1external-link1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comkryllicEnglish · 11 months agomessage-square12linkfedilink
Cipherd@lemmy.mlEnglish · 1 year agoDroidFS v2.2.0plus-squareforge.chapril.orgexternal-linkmessage-square2linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkDroidFS v2.2.0plus-squareforge.chapril.orgCipherd@lemmy.mlEnglish · 1 year agomessage-square2linkfedilink