cm0002@lemmy.world to memes@lemmy.world · 7 days agoOhh husbando! We need to learn marine technologies for the floods, husbandoslrpnk.netimagemessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageOhh husbando! We need to learn marine technologies for the floods, husbandoslrpnk.netcm0002@lemmy.world to memes@lemmy.world · 7 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 8 days agoAdult sites trick users into Liking Facebook posts using a clickjack Trojanplus-squarewww.malwarebytes.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAdult sites trick users into Liking Facebook posts using a clickjack Trojanplus-squarewww.malwarebytes.comcm0002@lemmy.world to cybersecurity@infosec.pub · 8 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 12 days agoFlipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brandsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFlipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brandsplus-squarecybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 12 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 12 days agoWindows User Account Control Bypassed Using Character Editor to Escalate Privilegesplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows User Account Control Bypassed Using Character Editor to Escalate Privilegesplus-squarecybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 12 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 14 days agoReVault! When your SoC turns against you…plus-squareblog.talosintelligence.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReVault! When your SoC turns against you…plus-squareblog.talosintelligence.comcm0002@lemmy.world to cybersecurity@infosec.pub · 14 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 17 days agoLazarus Group rises again, this time with fake FOSSplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLazarus Group rises again, this time with fake FOSSplus-squarewww.theregister.comcm0002@lemmy.world to cybersecurity@infosec.pub · 17 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 18 days agoInternet exchange points are ignored, vulnerable, and absent from infrastructure protection plansplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInternet exchange points are ignored, vulnerable, and absent from infrastructure protection plansplus-squarewww.theregister.comcm0002@lemmy.world to cybersecurity@infosec.pub · 18 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 18 days agoNew 'Shade BIOS' Technique Beats Every Kind of Securityplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew 'Shade BIOS' Technique Beats Every Kind of Securityplus-squarewww.darkreading.comcm0002@lemmy.world to cybersecurity@infosec.pub · 18 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 21 days agoHandling malicious requests with fail2banplus-squaresergiocipriano.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHandling malicious requests with fail2banplus-squaresergiocipriano.comcm0002@lemmy.world to cybersecurity@infosec.pub · 21 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 21 days agoPalo Alto to scoop up CyberArk for $25 billion to tackle AI-era threatsplus-squarefinance.yahoo.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPalo Alto to scoop up CyberArk for $25 billion to tackle AI-era threatsplus-squarefinance.yahoo.comcm0002@lemmy.world to cybersecurity@infosec.pub · 21 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 22 days agoCISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitationplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitationplus-squarethehackernews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 22 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 22 days agoVulnerability-Lookup 2.14.0 releasedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability-Lookup 2.14.0 releasedplus-squarewww.vulnerability-lookup.orgcm0002@lemmy.world to cybersecurity@infosec.pub · 22 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 22 days agoApple’s New Containerization Feature Allows Kali Linux Integration on macOSplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple’s New Containerization Feature Allows Kali Linux Integration on macOSplus-squarecybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 22 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 23 days agoSecurity pros are drowning in threat-intel data and it's making everything more dangerousplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity pros are drowning in threat-intel data and it's making everything more dangerousplus-squarewww.theregister.comcm0002@lemmy.world to cybersecurity@infosec.pub · 23 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 23 days agoVulnhuntr: Open-source tool to identify remotely exploitable vulnerabilitiesplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnhuntr: Open-source tool to identify remotely exploitable vulnerabilitiesplus-squarewww.helpnetsecurity.comcm0002@lemmy.world to cybersecurity@infosec.pub · 23 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 25 days agoDNS security is important but DNSSEC may be a failed experimentplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDNS security is important but DNSSEC may be a failed experimentplus-squarewww.theregister.comcm0002@lemmy.world to cybersecurity@infosec.pub · 25 days agomessage-square0linkfedilink
cm0002@lemmy.world to cybersecurity@infosec.pub · 26 days agoUNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwordsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwordsplus-squarecybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 26 days agomessage-square0linkfedilink
cm0002@lemmy.world to privacy@lemmy.ca · edit-21 month agoGoogle is tracking you even when you use DuckDuckGo [privacy respecting search engines, via trackers on the websites that you visit]plus-squarewww.simpleanalytics.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle is tracking you even when you use DuckDuckGo [privacy respecting search engines, via trackers on the websites that you visit]plus-squarewww.simpleanalytics.comcm0002@lemmy.world to privacy@lemmy.ca · edit-21 month agomessage-square0linkfedilink
cm0002@lemmy.world to privacy@lemmy.ca · 2 months agoICE Is Using a New Facial Recognition App to Identify People, Leaked Emails Showplus-squarewww.404media.coexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkICE Is Using a New Facial Recognition App to Identify People, Leaked Emails Showplus-squarewww.404media.cocm0002@lemmy.world to privacy@lemmy.ca · 2 months agomessage-square0linkfedilink
cm0002@lemmy.world to privacy@lemmy.ca · 2 months agoPsylo iOS browser takes aim at digital fingerprintingplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPsylo iOS browser takes aim at digital fingerprintingplus-squarewww.theregister.comcm0002@lemmy.world to privacy@lemmy.ca · 2 months agomessage-square0linkfedilink