☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agoThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messageplus-squaretheintercept.comexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThis Undisclosed WhatsApp Vulnerability Lets Governments See Who You Messageplus-squaretheintercept.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agoRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRecursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Executionplus-squaregithub.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agoNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agoHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 6 months agoBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.eulemmyreader@lemmy.mlEnglish · 6 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 6 months ago16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infolemmyreader@lemmy.mlEnglish · 6 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 6 months agoNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comArthur Besse@lemmy.mlEnglish · 6 months agomessage-square0fedilink
maegul (he/they)@lemmy.mlEnglish · 6 months agoHow well can an employer be certain of a remote employee's geographical location?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow well can an employer be certain of a remote employee's geographical location?plus-squaremaegul (he/they)@lemmy.mlEnglish · 6 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 6 months agoStealing your Telegram account in 10 seconds flatplus-squarelyra.horseexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealing your Telegram account in 10 seconds flatplus-squarelyra.horselemmyreader@lemmy.mlEnglish · 6 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agoNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agomessage-square0fedilink
t0mri@lemmy.ml · 6 months agoA doubt in encryptionplus-squarelemmy.mlimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageA doubt in encryptionplus-squarelemmy.mlt0mri@lemmy.ml · 6 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 6 months agoComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comlemmyreader@lemmy.mlEnglish · 6 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 6 months agoPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.auexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.aulemmyreader@lemmy.mlEnglish · 6 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 7 months agoA dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHubplus-squaremastodon.socialexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHubplus-squaremastodon.social☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 7 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 7 months agoAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comlemmyreader@lemmy.mlEnglish · 7 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · edit-27 months agoPuTTY priority high vulnerability CVE-2024-31497plus-squarehachyderm.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPuTTY priority high vulnerability CVE-2024-31497plus-squarehachyderm.iolemmyreader@lemmy.mlEnglish · edit-27 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 7 months agoGmail And YouTube Hackers Bypass Google’s 2FA Account Securityplus-squarewww.forbes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGmail And YouTube Hackers Bypass Google’s 2FA Account Securityplus-squarewww.forbes.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 7 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 7 months agoNew Technique Detected in an Open Source Supply Chain Attackplus-squarecheckmarx.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Technique Detected in an Open Source Supply Chain Attackplus-squarecheckmarx.comlemmyreader@lemmy.mlEnglish · 7 months agomessage-square0fedilink
lemmyreader@lemmy.ml · 7 months agoNew Spectre v2 attack impacts Linux systems on Intel CPUsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Spectre v2 attack impacts Linux systems on Intel CPUsplus-squarewww.bleepingcomputer.comlemmyreader@lemmy.ml · 7 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 7 months agoWhere The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Themplus-squarewww.flux.utah.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhere The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Themplus-squarewww.flux.utah.edulemmyreader@lemmy.mlEnglish · 7 months agomessage-square0fedilink