Amoxtli@thelemmy.club · 12 hours agoSwitzerland built an alternative to BGP. Nobody noticedplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up10
arrow-up10external-linkSwitzerland built an alternative to BGP. Nobody noticedplus-squarewww.theregister.comAmoxtli@thelemmy.club · 12 hours agomessage-square1fedilink
not_IO@lemmy.blahaj.zone · 15 hours agoWe don't need to hack your AI Agent to hack your AI Agent - SRLabs Researchplus-squaresrlabs.deexternal-linkmessage-square0fedilinkarrow-up10cross-posted to: cybersecurity@infosec.pub
arrow-up10external-linkWe don't need to hack your AI Agent to hack your AI Agent - SRLabs Researchplus-squaresrlabs.denot_IO@lemmy.blahaj.zone · 15 hours agomessage-square0fedilinkcross-posted to: cybersecurity@infosec.pub
shellsharks@infosec.pubM · 2 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up10
arrow-up10message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 2 days agomessage-square0fedilink
cm0002@no.lastname.nz · 4 days agoCrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Rootwww.qualys.comexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkCrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Rootwww.qualys.comcm0002@no.lastname.nz · 4 days agomessage-square0fedilink
cm0002 · 6 days agoAI Agent Hacks McKinseyplus-squarecodewall.aiexternal-linkmessage-square2fedilinkarrow-up11
arrow-up11external-linkAI Agent Hacks McKinseyplus-squarecodewall.aicm0002 · 6 days agomessage-square2fedilink
cm0002@no.lastname.nz · 4 days agoSupply-chain attack using invisible code hits GitHub and other repositoriesplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkSupply-chain attack using invisible code hits GitHub and other repositoriesplus-squarearstechnica.comcm0002@no.lastname.nz · 4 days agomessage-square0fedilink
cm0002@no.lastname.nz · 5 days ago45,000 malicious IP addresses taken down in international cyber operationplus-squarewww.interpol.intexternal-linkmessage-square1fedilinkarrow-up10
arrow-up10external-link45,000 malicious IP addresses taken down in international cyber operationplus-squarewww.interpol.intcm0002@no.lastname.nz · 5 days agomessage-square1fedilink
shellsharks@infosec.pubM · 5 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up10
arrow-up10message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 5 days agomessage-square0fedilink
shellsharks@infosec.pubM · 7 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square2fedilinkarrow-up10
arrow-up10message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 7 days agomessage-square2fedilink
cm0002 · 9 days agoRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comexternal-linkmessage-square3fedilinkarrow-up11
arrow-up11external-linkRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comcm0002 · 9 days agomessage-square3fedilink
shellsharks@infosec.pubM · 9 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up10
arrow-up10message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 9 days agomessage-square0fedilink
Innerworld@lemmy.world · 9 days agoCountries with Most Personal Records Leaked in Data Breaches (2004-2025)www.voronoiapp.comimagemessage-square2fedilinkarrow-up10
arrow-up10imageCountries with Most Personal Records Leaked in Data Breaches (2004-2025)www.voronoiapp.comInnerworld@lemmy.world · 9 days agomessage-square2fedilink
cm0002@lemmings.world · 12 days agoFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comcm0002@lemmings.world · 12 days agomessage-square0fedilink
shellsharks@infosec.pubM · 12 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up10
arrow-up10message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 12 days agomessage-square0fedilink
cm0002@lemmings.world · 13 days agoGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comcm0002@lemmings.world · 13 days agomessage-square0fedilink
cm0002@lemmings.world · 13 days agoI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workcm0002@lemmings.world · 13 days agomessage-square0fedilink
shellsharks@infosec.pubM · 14 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1fedilinkarrow-up10
arrow-up10message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 14 days agomessage-square1fedilink
cm0002@lemmings.world · 15 days agoNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comexternal-linkmessage-square2fedilinkarrow-up10
arrow-up10external-linkNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comcm0002@lemmings.world · 15 days agomessage-square2fedilink
cm0002@lemmings.world · 16 days agohackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkhackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.iocm0002@lemmings.world · 16 days agomessage-square0fedilink