I eat words@group.ltMEnglish · 4 days agoThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comI eat words@group.ltMEnglish · 4 days agomessage-square0fedilink
KasTas@group.ltEnglish · 7 days agoAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netKasTas@group.ltEnglish · 7 days agomessage-square0fedilink
I eat words@group.ltMEnglish · 26 days agoArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgI eat words@group.ltMEnglish · 26 days agomessage-square0fedilink
I eat words@group.ltMEnglish · 2 months agoSecurity Advisory YSA-2024-03plus-squarewww.yubico.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkSecurity Advisory YSA-2024-03plus-squarewww.yubico.comI eat words@group.ltMEnglish · 2 months agomessage-square0fedilink
RGB@group.ltEnglish · 2 months agoChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comRGB@group.ltEnglish · 2 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 2 months agoIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comexternal-linkmessage-square3fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comI eat words@group.ltMEnglish · 2 months agomessage-square3fedilink
I eat words@group.ltMEnglish · 2 months agoHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comI eat words@group.ltMEnglish · 2 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 3 months agoWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comI eat words@group.ltMEnglish · 3 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 3 months agooss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkoss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgI eat words@group.ltMEnglish · 3 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 3 months agoMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comI eat words@group.ltMEnglish · 3 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 4 months agoA Leak of Biometric Police Data Is a Sign of Things to Comeplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkA Leak of Biometric Police Data Is a Sign of Things to Comeplus-squarewww.wired.comI eat words@group.ltMEnglish · 4 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 4 months agoWhen Regulation Encourages ISPs to Hack Their Customersplus-squarenews.risky.bizexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkWhen Regulation Encourages ISPs to Hack Their Customersplus-squarenews.risky.bizI eat words@group.ltMEnglish · 4 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 4 months agoregreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)plus-squarewww.qualys.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkregreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)plus-squarewww.qualys.comI eat words@group.ltMEnglish · 4 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 4 months agoPluralistic: The reason you can’t buy a car is the same reason that your health insurer let hackers dox you (28 Jun 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkPluralistic: The reason you can’t buy a car is the same reason that your health insurer let hackers dox you (28 Jun 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netI eat words@group.ltMEnglish · 4 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 5 months agoHow AI will change democracyplus-squarecyberscoop.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkHow AI will change democracyplus-squarecyberscoop.comI eat words@group.ltMEnglish · 5 months agomessage-square1fedilink
I eat words@group.ltMEnglish · 5 months ago2023 Biography of Marian Rejewski: “The First Enigma Codebreaker” | flyingpenguinplus-squarewww.flyingpenguin.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link2023 Biography of Marian Rejewski: “The First Enigma Codebreaker” | flyingpenguinplus-squarewww.flyingpenguin.comI eat words@group.ltMEnglish · 5 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 5 months agoGoogle Patches Fourth Chrome Zero-Day in Two Weeksplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkGoogle Patches Fourth Chrome Zero-Day in Two Weeksplus-squarewww.securityweek.comI eat words@group.ltMEnglish · 5 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 6 months agoEnhancing Open Source Security: Introducing Siren by OpenSSF – Open Source Security Foundationplus-squareopenssf.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEnhancing Open Source Security: Introducing Siren by OpenSSF – Open Source Security Foundationplus-squareopenssf.orgI eat words@group.ltMEnglish · 6 months agomessage-square0fedilink
KasTas@group.ltEnglish · 6 months agoUS following EU lead: financial institutions have 30 days to disclose breaches under new rulesplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkUS following EU lead: financial institutions have 30 days to disclose breaches under new rulesplus-squarearstechnica.comKasTas@group.ltEnglish · 6 months agomessage-square0fedilink
KasTas@group.ltEnglish · 6 months agoBreachForums, a key English-language cybercrime forum, seized by the FBIplus-squarecyberscoop.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkBreachForums, a key English-language cybercrime forum, seized by the FBIplus-squarecyberscoop.comKasTas@group.ltEnglish · 6 months agomessage-square0fedilink