Cedric@lemmy.mlEnglish · 44 minutes agoGNU InetUtils Security Advisory: remote authentication by-pass in telnetdplus-squarevulnerability.circl.luexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGNU InetUtils Security Advisory: remote authentication by-pass in telnetdplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 44 minutes agomessage-square0linkfedilink
Zerush@lemmy.ml · 11 hours agoDissecting CrashFix: KongTuke's New Toy | Huntressplus-squarewww.huntress.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkDissecting CrashFix: KongTuke's New Toy | Huntressplus-squarewww.huntress.comZerush@lemmy.ml · 11 hours agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agoChina bans U.S. and Israeli cybersecurity software over security concernsplus-squaresecurityaffairs.comexternal-linkmessage-square2linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkChina bans U.S. and Israeli cybersecurity software over security concernsplus-squaresecurityaffairs.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agomessage-square2linkfedilink
Arthur Besse@lemmy.mlEnglish · 3 days agoMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comArthur Besse@lemmy.mlEnglish · 3 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 8 days agoA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgCedric@lemmy.mlEnglish · 8 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 8 days agoVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 8 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 12 days agoNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comZerush@lemmy.ml · 12 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 13 days agoDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comZerush@lemmy.ml · 13 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 13 days agoChina hacked email systems of US congressional committee staffplus-squarewww.ft.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkChina hacked email systems of US congressional committee staffplus-squarewww.ft.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 13 days agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · 14 days ago"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-link"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.deArthur Besse@lemmy.mlEnglish · 14 days agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · 14 days agoBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.deexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.deArthur Besse@lemmy.mlEnglish · 14 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 17 days agoThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 17 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 27 days agoWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgexternal-linkmessage-square6linkfedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 27 days agomessage-square6linkfedilink
HiddenLayer555@lemmy.mlEnglish · edit-21 month agoPeople online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?plus-squaremessage-squaremessage-square6linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1message-squarePeople online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?plus-squareHiddenLayer555@lemmy.mlEnglish · edit-21 month agomessage-square6linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability-Lookup 2.20.0plus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareVulnerability-Lookup 2.20.0plus-squareCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Zerush@lemmy.ml · 1 month agoPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.luexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.luCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.devexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.dev☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink