Kissaki@programming.devEnglish · 1 year agoChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comKissaki@programming.devEnglish · 1 year agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 year agoDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioPro@programming.devEnglish · 1 year agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 year agoThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govPro@programming.devEnglish · 1 year agomessage-square0linkfedilink
Pro@programming.devEnglish · edit-21 year agoThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govPro@programming.devEnglish · edit-21 year agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 year agoThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comPro@programming.devEnglish · 1 year agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 year agoBackdoor found in popular ecommerce componentsplus-squaresansec.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBackdoor found in popular ecommerce componentsplus-squaresansec.ioPro@programming.devEnglish · 1 year agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 year agoReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comPro@programming.devEnglish · 1 year agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 year ago"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduPro@programming.devEnglish · 1 year agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 year agoA Flaw With the Security Level Slider in Tor Browserwww.privacyguides.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Flaw With the Security Level Slider in Tor Browserwww.privacyguides.orgPro@programming.devEnglish · 1 year agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 1 year agoWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · 1 year agomessage-square0linkfedilink
Kissaki@programming.devEnglish · edit-21 year agoMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · edit-21 year agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 1 year agoSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgKissaki@programming.devEnglish · 1 year agomessage-square0linkfedilink
Nemeski@lemm.eeEnglish · 1 year ago‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comNemeski@lemm.eeEnglish · 1 year agomessage-square0linkfedilink
cm0002@lemmy.worldEnglish · 1 year agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comcm0002@lemmy.worldEnglish · 1 year agomessage-square0linkfedilink
cm0002@lemmy.worldEnglish · 1 year agoAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techcm0002@lemmy.worldEnglish · 1 year agomessage-square0linkfedilink
💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 1 year agoHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.com💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 1 year agomessage-square0linkfedilink
ertai@programming.devEnglish · 2 years agoCryptography DEEPEST LOREplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptography DEEPEST LOREplus-squaregithub.comertai@programming.devEnglish · 2 years agomessage-square0linkfedilink
kryllic@programming.devEnglish · 2 years agoMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comkryllic@programming.devEnglish · 2 years agomessage-square0linkfedilink
kryllic@programming.devEnglish · 2 years ago1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comkryllic@programming.devEnglish · 2 years agomessage-square0linkfedilink
Cipherd@lemmy.mlEnglish · 2 years agoDroidFS v2.2.0plus-squareforge.chapril.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDroidFS v2.2.0plus-squareforge.chapril.orgCipherd@lemmy.mlEnglish · 2 years agomessage-square0linkfedilink