Kissaki@programming.devEnglish · 11 days agoThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioKissaki@programming.devEnglish · 11 days agomessage-square0fedilink
Kissaki@programming.devEnglish · 4 months agoChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comKissaki@programming.devEnglish · 4 months agomessage-square0fedilink
Pro@programming.devEnglish · 4 months agoDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioPro@programming.devEnglish · 4 months agomessage-square0fedilink
Pro@programming.devEnglish · 4 months agoThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govPro@programming.devEnglish · 4 months agomessage-square0fedilink
Pro@programming.devEnglish · edit-24 months agoThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govPro@programming.devEnglish · edit-24 months agomessage-square0fedilink
Pro@programming.devEnglish · 4 months agoThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comPro@programming.devEnglish · 4 months agomessage-square0fedilink
Pro@programming.devEnglish · 4 months agoBackdoor found in popular ecommerce componentsplus-squaresansec.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBackdoor found in popular ecommerce componentsplus-squaresansec.ioPro@programming.devEnglish · 4 months agomessage-square0fedilink
Pro@programming.devEnglish · 4 months agoReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comPro@programming.devEnglish · 4 months agomessage-square0fedilink
Pro@programming.devEnglish · 4 months ago"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduPro@programming.devEnglish · 4 months agomessage-square0fedilink
Pro@programming.devEnglish · 5 months agoA Flaw With the Security Level Slider in Tor Browserplus-squarewww.privacyguides.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Flaw With the Security Level Slider in Tor Browserplus-squarewww.privacyguides.orgPro@programming.devEnglish · 5 months agomessage-square0fedilink
Kissaki@programming.devEnglish · 5 months agoWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · 5 months agomessage-square0fedilink
Kissaki@programming.devEnglish · edit-25 months agoMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMillions of Apple Airplay-enabled devices can be hacked via Wi-Fi - Ars Technicaplus-squarearstechnica.comKissaki@programming.devEnglish · edit-25 months agomessage-square0fedilink
Kissaki@programming.devEnglish · 5 months agoSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSite Attestation: Browser-based Remote Attestationplus-squaredl.acm.orgKissaki@programming.devEnglish · 5 months agomessage-square0fedilink
cm0002@lemmy.worldEnglish · 5 months agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comcm0002@lemmy.worldEnglish · 5 months agomessage-square0fedilink
cm0002@lemmy.worldEnglish · 8 months agoAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing OpenGrep - Open-source static code analysis toolplus-squarepulse.latio.techcm0002@lemmy.worldEnglish · 8 months agomessage-square0fedilink
💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 10 months agoHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHumble Tech Book Bundle: Hacking 2024 by No Starchplus-squarewww.humblebundle.com💡𝚂𝗆𝖺𝗋𝗍𝗆𝖺𝗇 𝙰𝗉𝗉𝗌📱@programming.devEnglish · 10 months agomessage-square0fedilink
ertai@programming.devEnglish · 1 year agoCryptography DEEPEST LOREplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCryptography DEEPEST LOREplus-squaregithub.comertai@programming.devEnglish · 1 year agomessage-square0fedilink
kryllic@programming.devEnglish · 1 year agoMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft starts developing tools to prevent another global IT outageplus-squarewww.axios.comkryllic@programming.devEnglish · 1 year agomessage-square0fedilink
kryllic@programming.devEnglish · 1 year ago1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comkryllic@programming.devEnglish · 1 year agomessage-square0fedilink
Cipherd@lemmy.mlEnglish · 1 year agoDroidFS v2.2.0plus-squareforge.chapril.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDroidFS v2.2.0plus-squareforge.chapril.orgCipherd@lemmy.mlEnglish · 1 year agomessage-square0fedilink