Zerush@lemmy.ml · 3 days agoCybersecurity News Review - Week 35 (2025)plus-squarecybernewsweekly.substack.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCybersecurity News Review - Week 35 (2025)plus-squarecybernewsweekly.substack.comZerush@lemmy.ml · 3 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · edit-23 days agoTwo New feeds from CERT-FR integrated in Vulnerability-Lookupplus-squarediscourse.ossbase.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkTwo New feeds from CERT-FR integrated in Vulnerability-Lookupplus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · edit-23 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 7 days agoBCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourgplus-squarediscourse.ossbase.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourgplus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 7 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 7 days agoVulnerability-Lookup 2.15.0 releasedplus-squarediscourse.ossbase.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVulnerability-Lookup 2.15.0 releasedplus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 7 days agomessage-square0linkfedilink
ray@lemmy.mlEnglish · 13 days agoHow We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.comexternal-linkmessage-square1linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkHow We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.comray@lemmy.mlEnglish · 13 days agomessage-square1linkfedilink
Arthur Besse@lemmy.mlEnglish · 13 days agoIntel Outside: Hacking every Intel employee and various internal websitesplus-squareeaton-works.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkIntel Outside: Hacking every Intel employee and various internal websitesplus-squareeaton-works.comArthur Besse@lemmy.mlEnglish · 13 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 14 days agoGoogle's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdotplus-squareyro.slashdot.orgexternal-linkmessage-square0linkfedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkGoogle's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdotplus-squareyro.slashdot.orgZerush@lemmy.ml · 14 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 17 days agoMadeYouReset: Turning HTTP/2 Server Against Itself | Impervaplus-squarewww.imperva.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkMadeYouReset: Turning HTTP/2 Server Against Itself | Impervaplus-squarewww.imperva.comZerush@lemmy.ml · 17 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 20 days agoAdult sites trick users into Liking Facebook posts using a clickjack Trojanplus-squarewww.malwarebytes.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAdult sites trick users into Liking Facebook posts using a clickjack Trojanplus-squarewww.malwarebytes.comZerush@lemmy.ml · 20 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agoMSS unveils case of foreign agents hacking commercial camera to spy on Chinese portplus-squarewww.globaltimes.cnexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMSS unveils case of foreign agents hacking commercial camera to spy on Chinese portplus-squarewww.globaltimes.cn☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agoHackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Secondswww.wired.comexternal-linkmessage-square1linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkHackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Secondswww.wired.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agomessage-square1linkfedilink
Zerush@lemmy.ml · 26 days agoReVault! When your SoC turns against you…plus-squareblog.talosintelligence.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkReVault! When your SoC turns against you…plus-squareblog.talosintelligence.comZerush@lemmy.ml · 26 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · edit-21 month agoVulnerability-Lookup 2.14.0 releasedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVulnerability-Lookup 2.14.0 releasedplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · edit-21 month agomessage-square0linkfedilink
adbenitez@lemmy.ml · edit-21 month agoArcaneChat 2.6.0 released with major security enhancementplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1message-squareArcaneChat 2.6.0 released with major security enhancementplus-squareadbenitez@lemmy.ml · edit-21 month agomessage-square0linkfedilink
Zerush@lemmy.ml · 1 month agoAI-Generated Malware in Panda Image Hides Persistent Linux Threatplus-squarewww.aquasec.comexternal-linkmessage-square2linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkAI-Generated Malware in Panda Image Hides Persistent Linux Threatplus-squarewww.aquasec.comZerush@lemmy.ml · 1 month agomessage-square2linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoHacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agentplus-squarewww.404media.coexternal-linkmessage-square1linkfedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkHacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agentplus-squarewww.404media.co☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square1linkfedilink
Zerush@lemmy.ml · 1 month ago‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old companyplus-squarewww.hindustantimes.comexternal-linkmessage-square6linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-link‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old companyplus-squarewww.hindustantimes.comZerush@lemmy.ml · 1 month agomessage-square6linkfedilink
goatbeard@beehaw.org · 1 month agoLimitations of GrapheneOSplus-squaremessage-squaremessage-square4linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareLimitations of GrapheneOSplus-squaregoatbeard@beehaw.org · 1 month agomessage-square4linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoThe Solidity Language open-source package was used in a $500,000 crypto heistplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Solidity Language open-source package was used in a $500,000 crypto heistplus-squaresecurelist.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
Zerush@lemmy.ml · 2 months agoMalware in DNS - DomainTools Investigations | DTIplus-squaredti.domaintools.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMalware in DNS - DomainTools Investigations | DTIplus-squaredti.domaintools.comZerush@lemmy.ml · 2 months agomessage-square0linkfedilink