codeinabox@programming.devEnglish · 11 hours agoBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comexternal-linkmessage-square2linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comcodeinabox@programming.devEnglish · 11 hours agomessage-square2linkfedilink
codeinabox@programming.devEnglish · 14 hours agoHope Is Not a Security Strategy: Why Secure-by-Default Beats Hardeningplus-squaretuananh.netexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHope Is Not a Security Strategy: Why Secure-by-Default Beats Hardeningplus-squaretuananh.netcodeinabox@programming.devEnglish · 14 hours agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 19 hours agoLocal tools should still use vaultsplus-squarepierce.devexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkLocal tools should still use vaultsplus-squarepierce.devcodeinabox@programming.devEnglish · 19 hours agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 5 days agoHow recruitment fraud turned cloud IAM into a $2 billion attack surfaceplus-squareventurebeat.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkHow recruitment fraud turned cloud IAM into a $2 billion attack surfaceplus-squareventurebeat.comcodeinabox@programming.devEnglish · 5 days agomessage-square1linkfedilink
codeinabox@programming.devEnglish · 8 days agoFrom magic to malware: How OpenClaw's agent skills become an attack surfaceplus-square1password.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkFrom magic to malware: How OpenClaw's agent skills become an attack surfaceplus-square1password.comcodeinabox@programming.devEnglish · 8 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 12 days agoCloudflare says it mitigated a 31.4 Tbps DDoS attack from the Aisuru/Kimwolf botnet in December 2025, making it the largest attack ever disclosed publiclyplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkCloudflare says it mitigated a 31.4 Tbps DDoS attack from the Aisuru/Kimwolf botnet in December 2025, making it the largest attack ever disclosed publiclyplus-squarewww.bleepingcomputer.comInnerworld@lemmy.worldEnglish · 12 days agomessage-square0linkfedilink
Maximuse@programming.devEnglish · 14 days agoECDSA Encryptionplus-squarecertera.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkECDSA Encryptionplus-squarecertera.comMaximuse@programming.devEnglish · 14 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 24 days agoOn the Coming Industrialisation of Exploit Generation with LLMsplus-squaresean.heelan.ioexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkOn the Coming Industrialisation of Exploit Generation with LLMsplus-squaresean.heelan.iocodeinabox@programming.devEnglish · 24 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 1 month agoThe AI Security Shakedownplus-squareblog.jim-nielsen.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThe AI Security Shakedownplus-squareblog.jim-nielsen.comcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
onlinepersona@programming.devEnglish · 1 month agoI Found a Secret Hacker Team Fighting Cybercrime (they saved $1 billion) | video by NetworkChuck [26:56]plus-squaretube.blueben.netexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down17
arrow-up1-6arrow-down1external-linkI Found a Secret Hacker Team Fighting Cybercrime (they saved $1 billion) | video by NetworkChuck [26:56]plus-squaretube.blueben.netonlinepersona@programming.devEnglish · 1 month agomessage-square1linkfedilink
codeinabox@programming.devEnglish · 2 months agoHow to Ruin All of Package Managementplus-squarenesbitt.ioexternal-linkmessage-square3linkfedilinkarrow-up112arrow-down12
arrow-up110arrow-down1external-linkHow to Ruin All of Package Managementplus-squarenesbitt.iocodeinabox@programming.devEnglish · 2 months agomessage-square3linkfedilink
codeinabox@programming.devEnglish · 2 months agoLeading Global Research and Advisory Firm Recommends Against Using AI Browsersplus-squareblog.jim-nielsen.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkLeading Global Research and Advisory Firm Recommends Against Using AI Browsersplus-squareblog.jim-nielsen.comcodeinabox@programming.devEnglish · 2 months agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 2 months agoSVG Filters - Clickjacking 2.0plus-squarelyra.horseexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkSVG Filters - Clickjacking 2.0plus-squarelyra.horsecodeinabox@programming.devEnglish · 2 months agomessage-square0linkfedilink
Pierre-Yves Lapersonne@programming.devEnglish · 3 months agoShai-Hulud round 2 on GitHub, massive leaks of data and propagation of stealerplus-squareabout.gitlab.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12cross-posted to: [email protected]
arrow-up15arrow-down1external-linkShai-Hulud round 2 on GitHub, massive leaks of data and propagation of stealerplus-squareabout.gitlab.comPierre-Yves Lapersonne@programming.devEnglish · 3 months agomessage-square0linkfedilinkcross-posted to: [email protected]
Kissaki@programming.devEnglish · 3 months agoWe Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)plus-squarewww.youtube.comexternal-linkmessage-square2linkfedilinkarrow-up154arrow-down10
arrow-up154arrow-down1external-linkWe Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)plus-squarewww.youtube.comKissaki@programming.devEnglish · 3 months agomessage-square2linkfedilink
Michael Altfield@lemmy.vgEnglish · 3 months agoHow to check if Tor Onion Service is alive?plus-squaremessage-squaremessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareHow to check if Tor Onion Service is alive?plus-squareMichael Altfield@lemmy.vgEnglish · 3 months agomessage-square1linkfedilink
Kissaki@programming.devEnglish · 5 months agoThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioKissaki@programming.devEnglish · 5 months agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 9 months agoChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comexternal-linkmessage-square3linkfedilinkarrow-up117arrow-down14
arrow-up113arrow-down1external-linkChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comKissaki@programming.devEnglish · 9 months agomessage-square3linkfedilink
Kissaki@programming.devEnglish · 10 months agoWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square2linkfedilinkarrow-up118arrow-down14
arrow-up114arrow-down1external-linkWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · 10 months agomessage-square2linkfedilink