☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agoHow I Almost Got Hacked By A 'Job Interview'plus-squareblog.daviddodda.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkHow I Almost Got Hacked By A 'Job Interview'plus-squareblog.daviddodda.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agomessage-square1fedilink
Zerush@lemmy.ml · 5 days agoMS Digital Defense Reportplus-squarecdn-dynmedia-1.microsoft.comexternal-linkmessage-square2fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMS Digital Defense Reportplus-squarecdn-dynmedia-1.microsoft.comZerush@lemmy.ml · 5 days agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · edit-28 days agoSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · edit-28 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 10 days agoASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Usersplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Usersplus-squarecybersecuritynews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 10 days agomessage-square1fedilink
Cedric@lemmy.mlEnglish · edit-219 days agoVulnerability Report - September 2025plus-squaremessage-squaremessage-square3fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareVulnerability Report - September 2025plus-squareCedric@lemmy.mlEnglish · edit-219 days agomessage-square3fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 26 days agoHacking Campaign Has Breached Cisco Devices in US Governmentplus-squarewww.bloomberg.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHacking Campaign Has Breached Cisco Devices in US Governmentplus-squarewww.bloomberg.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 26 days agomessage-square0fedilink
Cedric@lemmy.mlEnglish · edit-21 month agoVulnerability-Lookup 2.16.0plus-squaremessage-squaremessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareVulnerability-Lookup 2.16.0plus-squareCedric@lemmy.mlEnglish · edit-21 month agomessage-square0fedilink
Zerush@lemmy.ml · 1 month agoSatori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation - HUMAN Securityplus-squarewww.humansecurity.comexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSatori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation - HUMAN Securityplus-squarewww.humansecurity.comZerush@lemmy.ml · 1 month agomessage-square1fedilink
ray@lemmy.mlEnglish · 1 month agoApple releases iOS 15.8.5 security update for 10-year old iPhone 6splus-squaresupport.apple.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkApple releases iOS 15.8.5 security update for 10-year old iPhone 6splus-squaresupport.apple.comray@lemmy.mlEnglish · 1 month agomessage-square0fedilink
ray@lemmy.mlEnglish · 1 month agoSelf-Replicating Worm Hits 180+ Software Packagesplus-squarekrebsonsecurity.comexternal-linkmessage-square1fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkSelf-Replicating Worm Hits 180+ Software Packagesplus-squarekrebsonsecurity.comray@lemmy.mlEnglish · 1 month agomessage-square1fedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability Report - August 2025plus-squarediscourse.ossbase.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkVulnerability Report - August 2025plus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agonpm debug and chalk packages compromisedwww.aikido.devexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linknpm debug and chalk packages compromisedwww.aikido.dev☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoThe number of mis-issued 1.1.1.1 certificates grows. Here’s the latest.plus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkThe number of mis-issued 1.1.1.1 certificates grows. Here’s the latest.plus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Zerush@lemmy.ml · 2 months agoCybersecurity News Review - Week 35 (2025)plus-squarecybernewsweekly.substack.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCybersecurity News Review - Week 35 (2025)plus-squarecybernewsweekly.substack.comZerush@lemmy.ml · 2 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · edit-22 months agoTwo New feeds from CERT-FR integrated in Vulnerability-Lookupplus-squarediscourse.ossbase.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkTwo New feeds from CERT-FR integrated in Vulnerability-Lookupplus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · edit-22 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoVulnerability-Lookup 2.15.0 releasedplus-squarediscourse.ossbase.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVulnerability-Lookup 2.15.0 releasedplus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoBCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourgplus-squarediscourse.ossbase.orgexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourgplus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
ray@lemmy.mlEnglish · 2 months agoHow We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.comexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkHow We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.comray@lemmy.mlEnglish · 2 months agomessage-square1fedilink
Arthur Besse@lemmy.mlEnglish · 2 months agoIntel Outside: Hacking every Intel employee and various internal websitesplus-squareeaton-works.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkIntel Outside: Hacking every Intel employee and various internal websitesplus-squareeaton-works.comArthur Besse@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Zerush@lemmy.ml · 2 months agoGoogle's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdotplus-squareyro.slashdot.orgexternal-linkmessage-square0fedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkGoogle's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdotplus-squareyro.slashdot.orgZerush@lemmy.ml · 2 months agomessage-square0fedilink