Maximuse@programming.devEnglish · 5 days agoECDSA Encryptionplus-squarecertera.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkECDSA Encryptionplus-squarecertera.comMaximuse@programming.devEnglish · 5 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 16 days agoOn the Coming Industrialisation of Exploit Generation with LLMsplus-squaresean.heelan.ioexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkOn the Coming Industrialisation of Exploit Generation with LLMsplus-squaresean.heelan.iocodeinabox@programming.devEnglish · 16 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 26 days agoThe AI Security Shakedownplus-squareblog.jim-nielsen.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThe AI Security Shakedownplus-squareblog.jim-nielsen.comcodeinabox@programming.devEnglish · 26 days agomessage-square0linkfedilink
onlinepersona@programming.devEnglish · 1 month agoI Found a Secret Hacker Team Fighting Cybercrime (they saved $1 billion) | video by NetworkChuck [26:56]plus-squaretube.blueben.netexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down16
arrow-up1-5arrow-down1external-linkI Found a Secret Hacker Team Fighting Cybercrime (they saved $1 billion) | video by NetworkChuck [26:56]plus-squaretube.blueben.netonlinepersona@programming.devEnglish · 1 month agomessage-square1linkfedilink
codeinabox@programming.devEnglish · 1 month agoHow to Ruin All of Package Managementplus-squarenesbitt.ioexternal-linkmessage-square3linkfedilinkarrow-up112arrow-down12
arrow-up110arrow-down1external-linkHow to Ruin All of Package Managementplus-squarenesbitt.iocodeinabox@programming.devEnglish · 1 month agomessage-square3linkfedilink
codeinabox@programming.devEnglish · 1 month agoLeading Global Research and Advisory Firm Recommends Against Using AI Browsersplus-squareblog.jim-nielsen.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkLeading Global Research and Advisory Firm Recommends Against Using AI Browsersplus-squareblog.jim-nielsen.comcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 2 months agoSVG Filters - Clickjacking 2.0plus-squarelyra.horseexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkSVG Filters - Clickjacking 2.0plus-squarelyra.horsecodeinabox@programming.devEnglish · 2 months agomessage-square0linkfedilink
Pierre-Yves Lapersonne@programming.devEnglish · 2 months agoShai-Hulud round 2 on GitHub, massive leaks of data and propagation of stealerplus-squareabout.gitlab.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12cross-posted to: security@programming.dev
arrow-up15arrow-down1external-linkShai-Hulud round 2 on GitHub, massive leaks of data and propagation of stealerplus-squareabout.gitlab.comPierre-Yves Lapersonne@programming.devEnglish · 2 months agomessage-square0linkfedilinkcross-posted to: security@programming.dev
Kissaki@programming.devEnglish · 3 months agoWe Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)plus-squarewww.youtube.comexternal-linkmessage-square5linkfedilinkarrow-up155arrow-down10
arrow-up155arrow-down1external-linkWe Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)plus-squarewww.youtube.comKissaki@programming.devEnglish · 3 months agomessage-square5linkfedilink
Michael Altfield@lemmy.vgEnglish · 3 months agoHow to check if Tor Onion Service is alive?plus-squaremessage-squaremessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareHow to check if Tor Onion Service is alive?plus-squareMichael Altfield@lemmy.vgEnglish · 3 months agomessage-square1linkfedilink
Kissaki@programming.devEnglish · 5 months agoThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioKissaki@programming.devEnglish · 5 months agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 8 months agoChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comexternal-linkmessage-square5linkfedilinkarrow-up117arrow-down15
arrow-up112arrow-down1external-linkChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comKissaki@programming.devEnglish · 8 months agomessage-square5linkfedilink
Kissaki@programming.devEnglish · 9 months agoWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square2linkfedilinkarrow-up119arrow-down14
arrow-up115arrow-down1external-linkWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · 9 months agomessage-square2linkfedilink
Kissaki@programming.devEnglish · edit-29 months agoMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square1linkfedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · edit-29 months agomessage-square1linkfedilink
Kissaki@programming.devEnglish · 9 months agoSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgKissaki@programming.devEnglish · 9 months agomessage-square0linkfedilink
Nemeski@lemm.eeEnglish · 9 months ago‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comexternal-linkmessage-square15linkfedilinkarrow-up1106arrow-down11
arrow-up1105arrow-down1external-link‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comNemeski@lemm.eeEnglish · 9 months agomessage-square15linkfedilink
cm0002@lemmy.worldEnglish · 10 months agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square3linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comcm0002@lemmy.worldEnglish · 10 months agomessage-square3linkfedilink
cm0002@lemmy.worldEnglish · 1 year agoAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techexternal-linkmessage-square5linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techcm0002@lemmy.worldEnglish · 1 year agomessage-square5linkfedilink
💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 1 year agoHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.com💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 1 year agomessage-square0linkfedilink