cm0002@no.lastname.nz · 2 days agoCrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Rootwww.qualys.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Rootwww.qualys.comcm0002@no.lastname.nz · 2 days agomessage-square0linkfedilink
cm0002@no.lastname.nz · 3 days agoSupply-chain attack using invisible code hits GitHub and other repositoriesplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkSupply-chain attack using invisible code hits GitHub and other repositoriesplus-squarearstechnica.comcm0002@no.lastname.nz · 3 days agomessage-square0linkfedilink
cm0002@no.lastname.nz · 3 days ago45,000 malicious IP addresses taken down in international cyber operationplus-squarewww.interpol.intexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-link45,000 malicious IP addresses taken down in international cyber operationplus-squarewww.interpol.intcm0002@no.lastname.nz · 3 days agomessage-square0linkfedilink
cm0002@libretechni.ca · 4 days agoAI Agent Hacks McKinseyplus-squarecodewall.aiexternal-linkmessage-square2linkfedilinkarrow-up124arrow-down11
arrow-up123arrow-down1external-linkAI Agent Hacks McKinseyplus-squarecodewall.aicm0002@libretechni.ca · 4 days agomessage-square2linkfedilink
shellsharks@infosec.pubM · 3 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 3 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 5 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square2linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 5 days agomessage-square2linkfedilink
cm0002@libretechni.ca · 7 days agoRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comexternal-linkmessage-square3linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comcm0002@libretechni.ca · 7 days agomessage-square3linkfedilink
Innerworld@lemmy.world · 7 days agoCountries with Most Personal Records Leaked in Data Breaches (2004-2025)www.voronoiapp.comimagemessage-square2linkfedilinkarrow-up116arrow-down11
arrow-up115arrow-down1imageCountries with Most Personal Records Leaked in Data Breaches (2004-2025)www.voronoiapp.comInnerworld@lemmy.world · 7 days agomessage-square2linkfedilink
shellsharks@infosec.pubM · 7 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 7 days agomessage-square0linkfedilink
cm0002@lemmings.world · 10 days agoFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comcm0002@lemmings.world · 10 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 10 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 10 days agomessage-square0linkfedilink
cm0002@lemmings.world · 11 days agoGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comexternal-linkmessage-square1linkfedilinkarrow-up148arrow-down12
arrow-up146arrow-down1external-linkGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comcm0002@lemmings.world · 11 days agomessage-square1linkfedilink
cm0002@lemmings.world · 11 days agoI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down13
arrow-up15arrow-down1external-linkI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workcm0002@lemmings.world · 11 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 12 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 12 days agomessage-square0linkfedilink
cm0002@lemmings.world · 13 days agoNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comexternal-linkmessage-square2linkfedilinkarrow-up130arrow-down11
arrow-up129arrow-down1external-linkNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comcm0002@lemmings.world · 13 days agomessage-square2linkfedilink
cm0002@lemmings.world · 14 days agohackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkhackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.iocm0002@lemmings.world · 14 days agomessage-square0linkfedilink
cm0002@lemmings.world · 14 days agoVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgcm0002@lemmings.world · 14 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 14 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 14 days agomessage-square0linkfedilink
Valnao@sh.itjust.works · 18 days agoHow Russia is intercepting communications from European satellitesplus-squaretheconversation.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkHow Russia is intercepting communications from European satellitesplus-squaretheconversation.comValnao@sh.itjust.works · 18 days agomessage-square0linkfedilink
cm0002@infosec.pub · 18 days agoFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comexternal-linkmessage-square1linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comcm0002@infosec.pub · 18 days agomessage-square1linkfedilink