Kissaki@programming.devEnglish · 1 month agoChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comKissaki@programming.devEnglish · 1 month agomessage-square0linkfedilink
Pro@programming.devEnglish · 1 month agoDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioPro@programming.devEnglish · 1 month agomessage-square0linkfedilink
Pro@programming.devEnglish · 2 months agoThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govPro@programming.devEnglish · 2 months agomessage-square0linkfedilink
Pro@programming.devEnglish · edit-22 months agoThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govPro@programming.devEnglish · edit-22 months agomessage-square0linkfedilink
Pro@programming.devEnglish · 2 months agoThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comPro@programming.devEnglish · 2 months agomessage-square0linkfedilink
Pro@programming.devEnglish · 2 months agoBackdoor found in popular ecommerce componentsplus-squaresansec.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBackdoor found in popular ecommerce componentsplus-squaresansec.ioPro@programming.devEnglish · 2 months agomessage-square0linkfedilink
Pro@programming.devEnglish · 2 months agoReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comPro@programming.devEnglish · 2 months agomessage-square0linkfedilink
Pro@programming.devEnglish · 2 months ago"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduPro@programming.devEnglish · 2 months agomessage-square0linkfedilink
Pro@programming.devEnglish · 2 months agoA Flaw With the Security Level Slider in Tor Browserplus-squarewww.privacyguides.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Flaw With the Security Level Slider in Tor Browserplus-squarewww.privacyguides.orgPro@programming.devEnglish · 2 months agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 2 months agoWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · 2 months agomessage-square0linkfedilink
Kissaki@programming.devEnglish · edit-22 months agoMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · edit-22 months agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 2 months agoSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgKissaki@programming.devEnglish · 2 months agomessage-square0linkfedilink
Nemeski@lemm.eeEnglish · 2 months ago‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link‘Vibe coding’ using LLMs susceptible to most common security flawsplus-squarewww.scworld.comNemeski@lemm.eeEnglish · 2 months agomessage-square0linkfedilink
cm0002@lemmy.worldEnglish · 3 months agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comcm0002@lemmy.worldEnglish · 3 months agomessage-square0linkfedilink
cm0002@lemmy.worldEnglish · 5 months agoAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techcm0002@lemmy.worldEnglish · 5 months agomessage-square0linkfedilink
💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 7 months agoHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.com💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 7 months agomessage-square0linkfedilink
ertai@programming.devEnglish · 9 months agoCryptography DEEPEST LOREplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptography DEEPEST LOREplus-squaregithub.comertai@programming.devEnglish · 9 months agomessage-square0linkfedilink
kryllic@programming.devEnglish · 10 months agoMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comkryllic@programming.devEnglish · 10 months agomessage-square0linkfedilink
kryllic@programming.devEnglish · 10 months ago1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comkryllic@programming.devEnglish · 10 months agomessage-square0linkfedilink
Cipherd@lemmy.mlEnglish · 11 months agoDroidFS v2.2.0plus-squareforge.chapril.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDroidFS v2.2.0plus-squareforge.chapril.orgCipherd@lemmy.mlEnglish · 11 months agomessage-square0linkfedilink