davel [he/him]@lemmy.mlEnglish · 2 days agoViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comexternal-linkmessage-square1fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comdavel [he/him]@lemmy.mlEnglish · 2 days agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 days agoVSCode’s SSH Agent Is Bananasplus-squarefly.ioexternal-linkmessage-square0fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkVSCode’s SSH Agent Is Bananasplus-squarefly.io☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 days agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 3 days agoTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 3 days agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · edit-26 days agoAMD Zen 1 through Zen 4 CPUs use an insecure hash function in the signature validation for microcode updates; researchers released a proof of concept update which makes the RDRAND instruction return 4plus-squaregithub.comexternal-linkmessage-square5fedilinkarrow-up136arrow-down10
arrow-up136arrow-down1external-linkAMD Zen 1 through Zen 4 CPUs use an insecure hash function in the signature validation for microcode updates; researchers released a proof of concept update which makes the RDRAND instruction return 4plus-squaregithub.comArthur Besse@lemmy.mlEnglish · edit-26 days agomessage-square5fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 9 days agoWhatsApp says journalists and civil society members were targets of Israeli spywareplus-squarewww.theguardian.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkWhatsApp says journalists and civil society members were targets of Israeli spywareplus-squarewww.theguardian.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 9 days agomessage-square0fedilink
Zerush@lemmy.ml · 11 days agoSeized Cracked.io, Nulled.to hacking forums in Operation Talentplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkSeized Cracked.io, Nulled.to hacking forums in Operation Talentplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 11 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 12 days agoApple chips can be hacked to leak secrets from Gmail, iCloud, and moreplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkApple chips can be hacked to leak secrets from Gmail, iCloud, and moreplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 12 days agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 18 days agoHacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panelplus-squaresamcurry.netexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panelplus-squaresamcurry.net☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 18 days agomessage-square1fedilink
Cedric@lemmy.mlEnglish · 19 days agoThe Shadowserver Foundation Honeypot Feed is now integrated as a source of sightings in Vulnerability-Lookupplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe Shadowserver Foundation Honeypot Feed is now integrated as a source of sightings in Vulnerability-Lookupplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 19 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agoHackers leak 500,000 VPN passwordswww.youtube.comexternal-linkmessage-square3fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHackers leak 500,000 VPN passwordswww.youtube.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agomessage-square3fedilink
Cedric@lemmy.ml · 1 month agoVulnerability-Lookup 2.4.0plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerability-Lookup 2.4.0plus-squarewww.vulnerability-lookup.orgCedric@lemmy.ml · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoStealing passwords and PINs entered by Apple Vision Pro usersplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkStealing passwords and PINs entered by Apple Vision Pro usersplus-squarearxiv.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Cedric@lemmy.mlEnglish · edit-21 month agoDive into Historical Insights on Vulnerability Observations with Vulnerability-Lookupplus-squarelemmy.mlimagemessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1imageDive into Historical Insights on Vulnerability Observations with Vulnerability-Lookupplus-squarelemmy.mlCedric@lemmy.mlEnglish · edit-21 month agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoA client to gather vulnerability-related information from Blueskyplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkA client to gather vulnerability-related information from Blueskyplus-squaregithub.comCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoThe Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tacticsplus-squarevulnerability.circl.luexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkThe Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tacticsplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
atzanteol@sh.itjust.worksEnglish · 2 months agoShort-Lived Certificates Coming to Let’s Encryptplus-squareletsencrypt.orgexternal-linkmessage-square2fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkShort-Lived Certificates Coming to Let’s Encryptplus-squareletsencrypt.orgatzanteol@sh.itjust.worksEnglish · 2 months agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square1fedilink
birthdaycakebreadtea@lemmy.mlEnglish · 2 months agoDoes two-factor authentication with TOTP make sense in my case?plus-squaremessage-squaremessage-square5fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1message-squareDoes two-factor authentication with TOTP make sense in my case?plus-squarebirthdaycakebreadtea@lemmy.mlEnglish · 2 months agomessage-square5fedilink
Cedric@lemmy.mlEnglish · 2 months agoVulnerability-Lookup 2.2.0plus-squarelemmy.mlimagemessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1imageVulnerability-Lookup 2.2.0plus-squarelemmy.mlCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink