☆ Yσɠƚԋσʂ ☆English · 4 hours agoYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆English · 4 hours agomessage-square0fedilink
birthdaycakebreadteaEnglish · 8 days agoDoes two-factor authentication with TOTP make sense in my case?plus-squaremessage-squaremessage-square5fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1message-squareDoes two-factor authentication with TOTP make sense in my case?plus-squarebirthdaycakebreadteaEnglish · 8 days agomessage-square5fedilink
CedricEnglish · 15 days agoVulnerability-Lookup 2.2.0plus-squareimagemessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1imageVulnerability-Lookup 2.2.0plus-squareCedricEnglish · 15 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 19 days agoSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆English · 19 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 24 days agoLeaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlockplus-squarewww.404media.coexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkLeaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlockplus-squarewww.404media.co☆ Yσɠƚԋσʂ ☆English · 24 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 29 days agoNew Glove infostealer malware bypasses Chrome’s cookie encryptionplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew Glove infostealer malware bypasses Chrome’s cookie encryptionplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆English · 29 days agomessage-square0fedilink
CedricEnglish · 1 month agoLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squaremessage-squaremessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1message-squareLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squareCedricEnglish · 1 month agomessage-square2fedilink
Tender@lemmy.dbzer0.com · edit-21 month agoshopping issueplus-squaremessage-squaremessage-square10fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareshopping issueplus-squareTender@lemmy.dbzer0.com · edit-21 month agomessage-square10fedilink
☆ Yσɠƚԋσʂ ☆English · 2 months agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square2fedilinkarrow-up18arrow-down14
arrow-up14arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.com☆ Yσɠƚԋσʂ ☆English · 2 months agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆English · 2 months agoEuropean govt air-gapped systems breached using custom malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square4fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkEuropean govt air-gapped systems breached using custom malwareplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆English · 2 months agomessage-square4fedilink
Arthur BesseAEnglish · edit-23 months agoLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comArthur BesseAEnglish · edit-23 months agomessage-square0fedilink
Cedric · 3 months agoVulnerability Lookup 1.5.0plus-squareimagemessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1imageVulnerability Lookup 1.5.0plus-squareCedric · 3 months agomessage-square0fedilink
Arthur BesseAEnglish · 4 months ago"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comexternal-linkmessage-square0fedilinkarrow-up128arrow-down11
arrow-up127arrow-down1external-link"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comArthur BesseAEnglish · 4 months agomessage-square0fedilink
wihkum@lemmy.todayEnglish · 4 months agoWihkum - Emergency Response App for Schools in 2024plus-squarewihkum.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkWihkum - Emergency Response App for Schools in 2024plus-squarewihkum.comwihkum@lemmy.todayEnglish · 4 months agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆English · 4 months agoONNX Bot Tool Hijacks Microsoft 365 accounts & Even Bypass 2FAplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkONNX Bot Tool Hijacks Microsoft 365 accounts & Even Bypass 2FAplus-squarecybersecuritynews.com☆ Yσɠƚԋσʂ ☆English · 4 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 4 months agoiVerify found stock Google Pixel devices' app "showcase" With Excessive System Privileges, Including Remote Code Executionplus-squareiverify.ioexternal-linkmessage-square1fedilinkarrow-up18arrow-down13
arrow-up15arrow-down1external-linkiVerify found stock Google Pixel devices' app "showcase" With Excessive System Privileges, Including Remote Code Executionplus-squareiverify.io☆ Yσɠƚԋσʂ ☆English · 4 months agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆English · 4 months ago0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devicesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-link0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devicesplus-squarethehackernews.com☆ Yσɠƚԋσʂ ☆English · 4 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 5 months agoRansomware operators exploit ESXi hypervisor vulnerability for mass encryptionplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkRansomware operators exploit ESXi hypervisor vulnerability for mass encryptionplus-squarewww.microsoft.com☆ Yσɠƚԋσʂ ☆English · 5 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 5 months agoSignal downplays encryption key flaw, fixes it after X dramaplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down14
arrow-up16arrow-down1external-linkSignal downplays encryption key flaw, fixes it after X dramaplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆English · 5 months agomessage-square0fedilink
Cedric · 5 months agoVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comCedric · 5 months agomessage-square0fedilink