Zerush@lemmy.ml · 22 hours agoAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comZerush@lemmy.ml · 22 hours agomessage-square1linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agoWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agomessage-square0linkfedilink
Zerush@lemmy.ml · 7 days agoPassword managers less secure than promisedplus-squareethz.chexternal-linkmessage-square3linkfedilinkarrow-up120arrow-down12
arrow-up118arrow-down1external-linkPassword managers less secure than promisedplus-squareethz.chZerush@lemmy.ml · 7 days agomessage-square3linkfedilink
Cedric@lemmy.mlEnglish · 6 days agoVulnerability Report - January 2026plus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareVulnerability Report - January 2026plus-squareCedric@lemmy.mlEnglish · 6 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 8 days agoVulnerability-Lookup 4.0.0 is out – Federation is hereplus-squaremessage-squaremessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1message-squareVulnerability-Lookup 4.0.0 is out – Federation is hereplus-squareCedric@lemmy.mlEnglish · 8 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 11 days agoFake AI Chrome extensions with 300K users steal credentials, emailsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square4linkfedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkFake AI Chrome extensions with 300K users steal credentials, emailsplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 11 days agomessage-square4linkfedilink
Zerush@lemmy.ml · 14 days agoFake 7-Zip downloads are turning home PCs into proxy nodesplus-squarewww.malwarebytes.comexternal-linkmessage-square6linkfedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkFake 7-Zip downloads are turning home PCs into proxy nodesplus-squarewww.malwarebytes.comZerush@lemmy.ml · 14 days agomessage-square6linkfedilink
Zerush@lemmy.ml · 18 days agoThe Shadow Campaigns: Uncovering Global Espionageplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Shadow Campaigns: Uncovering Global Espionageplus-squareunit42.paloaltonetworks.comZerush@lemmy.ml · 18 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 21 days agoVulnerability-Lookup 3.0.0plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVulnerability-Lookup 3.0.0plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 21 days agomessage-square2linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 23 days agoMinimal CVE Hardened container image collectionplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMinimal CVE Hardened container image collectionplus-squaregithub.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 23 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 26 days agoPhishing attack: Numerous journalists targeted in attack via Signal Messengerplus-squarenetzpolitik.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkPhishing attack: Numerous journalists targeted in attack via Signal Messengerplus-squarenetzpolitik.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 26 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability-Lookup 2.21.0plus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareVulnerability-Lookup 2.21.0plus-squareCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoGNU InetUtils Security Advisory: remote authentication by-pass in telnetdplus-squarevulnerability.circl.luexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkGNU InetUtils Security Advisory: remote authentication by-pass in telnetdplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Zerush@lemmy.ml · 1 month agoDissecting CrashFix: KongTuke's New Toy | Huntressplus-squarewww.huntress.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkDissecting CrashFix: KongTuke's New Toy | Huntressplus-squarewww.huntress.comZerush@lemmy.ml · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoChina bans U.S. and Israeli cybersecurity software over security concernsplus-squaresecurityaffairs.comexternal-linkmessage-square2linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkChina bans U.S. and Israeli cybersecurity software over security concernsplus-squaresecurityaffairs.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square2linkfedilink
Arthur Besse@lemmy.mlEnglish · 1 month agoMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comArthur Besse@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Zerush@lemmy.ml · 2 months agoNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comZerush@lemmy.ml · 2 months agomessage-square0linkfedilink
Zerush@lemmy.ml · 2 months agoDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comZerush@lemmy.ml · 2 months agomessage-square0linkfedilink