CedricEnglish · 11 hours agoThe Shadowserver Foundation Honeypot Feed is now integrated as a source of sightings in Vulnerability-Lookupplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Shadowserver Foundation Honeypot Feed is now integrated as a source of sightings in Vulnerability-Lookupplus-squarewww.vulnerability-lookup.orgCedricEnglish · 11 hours agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 2 days agoHackers leak 500,000 VPN passwordswww.youtube.comexternal-linkmessage-square2fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHackers leak 500,000 VPN passwordswww.youtube.com☆ Yσɠƚԋσʂ ☆English · 2 days agomessage-square2fedilink
Cedric · 13 days agoVulnerability-Lookup 2.4.0plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerability-Lookup 2.4.0plus-squarewww.vulnerability-lookup.orgCedric · 13 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 13 days agoStealing passwords and PINs entered by Apple Vision Pro usersplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkStealing passwords and PINs entered by Apple Vision Pro usersplus-squarearxiv.org☆ Yσɠƚԋσʂ ☆English · 13 days agomessage-square0fedilink
CedricEnglish · edit-221 days agoDive into Historical Insights on Vulnerability Observations with Vulnerability-Lookupplus-squareimagemessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1imageDive into Historical Insights on Vulnerability Observations with Vulnerability-Lookupplus-squareCedricEnglish · edit-221 days agomessage-square0fedilink
CedricEnglish · 28 days agoA client to gather vulnerability-related information from Blueskyplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkA client to gather vulnerability-related information from Blueskyplus-squaregithub.comCedricEnglish · 28 days agomessage-square0fedilink
CedricEnglish · 1 month agoThe Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tacticsplus-squarevulnerability.circl.luexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkThe Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tacticsplus-squarevulnerability.circl.luCedricEnglish · 1 month agomessage-square0fedilink
atzanteol@sh.itjust.worksEnglish · 1 month agoShort-Lived Certificates Coming to Let’s Encryptplus-squareletsencrypt.orgexternal-linkmessage-square2fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkShort-Lived Certificates Coming to Let’s Encryptplus-squareletsencrypt.orgatzanteol@sh.itjust.worksEnglish · 1 month agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆English · 1 month agoYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆English · 1 month agomessage-square1fedilink
birthdaycakebreadteaEnglish · 2 months agoDoes two-factor authentication with TOTP make sense in my case?plus-squaremessage-squaremessage-square5fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1message-squareDoes two-factor authentication with TOTP make sense in my case?plus-squarebirthdaycakebreadteaEnglish · 2 months agomessage-square5fedilink
CedricEnglish · 2 months agoVulnerability-Lookup 2.2.0plus-squareimagemessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1imageVulnerability-Lookup 2.2.0plus-squareCedricEnglish · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 2 months agoSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆English · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 2 months agoLeaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlockplus-squarewww.404media.coexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkLeaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlockplus-squarewww.404media.co☆ Yσɠƚԋσʂ ☆English · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English · 2 months agoNew Glove infostealer malware bypasses Chrome’s cookie encryptionplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew Glove infostealer malware bypasses Chrome’s cookie encryptionplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆English · 2 months agomessage-square0fedilink
CedricEnglish · 3 months agoLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squaremessage-squaremessage-square2fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1message-squareLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squareCedricEnglish · 3 months agomessage-square2fedilink
Tender@lemmy.dbzer0.com · edit-23 months agoshopping issueplus-squaremessage-squaremessage-square10fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareshopping issueplus-squareTender@lemmy.dbzer0.com · edit-23 months agomessage-square10fedilink
☆ Yσɠƚԋσʂ ☆English · 3 months agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square2fedilinkarrow-up19arrow-down14
arrow-up15arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.com☆ Yσɠƚԋσʂ ☆English · 3 months agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆English · 4 months agoEuropean govt air-gapped systems breached using custom malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square4fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkEuropean govt air-gapped systems breached using custom malwareplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆English · 4 months agomessage-square4fedilink
Arthur BesseAEnglish · edit-24 months agoLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comArthur BesseAEnglish · edit-24 months agomessage-square0fedilink
Cedric · 5 months agoVulnerability Lookup 1.5.0plus-squareimagemessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1imageVulnerability Lookup 1.5.0plus-squareCedric · 5 months agomessage-square0fedilink