Pro@programming.dev to cybersecurity@infosec.pub · 3 days ago[Meta] Can you allow the English language posts?plus-squareinfosec.pubimagemessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1image[Meta] Can you allow the English language posts?plus-squareinfosec.pubPro@programming.dev to cybersecurity@infosec.pub · 3 days agomessage-square1linkfedilink
Pro@programming.dev to cybersecurity@infosec.pub · 15 days agoOops Safari, I think You Spilled Something!plus-squareblog.exodusintel.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOops Safari, I think You Spilled Something!plus-squareblog.exodusintel.comPro@programming.dev to cybersecurity@infosec.pub · 15 days agomessage-square0linkfedilink
Pro@programming.dev to cybersecurity@infosec.pub · edit-216 days agoCracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vaultplus-squarecyata.aiexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vaultplus-squarecyata.aiPro@programming.dev to cybersecurity@infosec.pub · edit-216 days agomessage-square0linkfedilink
Pro@programming.dev to cybersecurity@infosec.pub · 17 days agoMicrosoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistanceplus-squarewww.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistanceplus-squarewww.microsoft.comPro@programming.dev to cybersecurity@infosec.pub · 17 days agomessage-square0linkfedilink
Pro@programming.dev to cybersecurity@infosec.pub · 23 days agoScammers Unleash Flood of Slick Online Gaming Sitesplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkScammers Unleash Flood of Slick Online Gaming Sitesplus-squarekrebsonsecurity.comPro@programming.dev to cybersecurity@infosec.pub · 23 days agomessage-square0linkfedilink
Pro@programming.dev to cybersecurity@infosec.pub · 24 days agoCobalt Strike Beacon delivered via GitHub and social mediaplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCobalt Strike Beacon delivered via GitHub and social mediaplus-squaresecurelist.comPro@programming.dev to cybersecurity@infosec.pub · 24 days agomessage-square0linkfedilink
Pro@programming.dev to cybersecurity@infosec.pub · 24 days agoSealed Chain of Deception: Actors leveraging Node.JS to Launch JSCealplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSealed Chain of Deception: Actors leveraging Node.JS to Launch JSCealplus-squareresearch.checkpoint.comPro@programming.dev to cybersecurity@infosec.pub · 24 days agomessage-square0linkfedilink
Pro@programming.dev to cybersecurity@infosec.pub · 25 days agoSploitlight: Analyzing a Spotlight-based macOS TCC vulnerabilityplus-squarewww.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSploitlight: Analyzing a Spotlight-based macOS TCC vulnerabilityplus-squarewww.microsoft.comPro@programming.dev to cybersecurity@infosec.pub · 25 days agomessage-square0linkfedilink
Pro@programming.dev to memes@lemmy.worldEnglish · edit-226 days agoAI Art.plus-squareprogramming.devimagemessage-square1linkfedilinkarrow-up10arrow-down11
arrow-up1-1arrow-down1imageAI Art.plus-squareprogramming.devPro@programming.dev to memes@lemmy.worldEnglish · edit-226 days agomessage-square1linkfedilink