onlinepersona@programming.dev · 16 hours agoWhatever happened to Secure Quick Reliable Login (SQRL)?plus-squaremessage-squaremessage-square1fedilinkarrow-up10
arrow-up10message-squareWhatever happened to Secure Quick Reliable Login (SQRL)?plus-squareonlinepersona@programming.dev · 16 hours agomessage-square1fedilink
cm0002@lemdro.id · 22 hours agoMS Digital Defense Reportplus-squarecdn-dynmedia-1.microsoft.comexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkMS Digital Defense Reportplus-squarecdn-dynmedia-1.microsoft.comcm0002@lemdro.id · 22 hours agomessage-square0fedilink
shellsharks@infosec.pubM · 3 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0fedilinkarrow-up10
arrow-up10message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 3 days agomessage-square0fedilink
cm0002@lemmy.zip · 3 days agoRealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbacksplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up10
arrow-up10external-linkRealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbacksplus-squarecybersecuritynews.comcm0002@lemmy.zip · 3 days agomessage-square1fedilink
cm0002@lemdro.id · 4 days agoSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkSatellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Dataplus-squarewww.wired.comcm0002@lemdro.id · 4 days agomessage-square0fedilink
cm0002@lemdro.id · 6 days agoASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Usersplus-squarecybersecuritynews.comexternal-linkmessage-square2fedilinkarrow-up10
arrow-up10external-linkASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Usersplus-squarecybersecuritynews.comcm0002@lemdro.id · 6 days agomessage-square2fedilink
cm0002@lemmy.zip · 7 days agoRondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home deviceplus-squarewww.theregister.comexternal-linkmessage-square6fedilinkarrow-up10
arrow-up10external-linkRondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home deviceplus-squarewww.theregister.comcm0002@lemmy.zip · 7 days agomessage-square6fedilink
randomname@scribe.disroot.org · 11 days agoSuspected Chinese cyber spies targeted Serbian aviation agencyplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkSuspected Chinese cyber spies targeted Serbian aviation agencyplus-squaretherecord.mediarandomname@scribe.disroot.org · 11 days agomessage-square0fedilink
randomname@scribe.disroot.org · 12 days agoChinese hackers exploiting VMware zero-day since October 2024plus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkChinese hackers exploiting VMware zero-day since October 2024plus-squarewww.bleepingcomputer.comrandomname@scribe.disroot.org · 12 days agomessage-square0fedilink
cm0002@piefed.socialEnglish · 14 days agoPoC exploit Released for VMware Workstation guest-to-host escape Vulnerabilityplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up10
arrow-up10external-linkPoC exploit Released for VMware Workstation guest-to-host escape Vulnerabilityplus-squarecybersecuritynews.comcm0002@piefed.socialEnglish · 14 days agomessage-square1fedilink
shellsharks@infosec.pubM · 15 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square2fedilinkarrow-up10
arrow-up10message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 15 days agomessage-square2fedilink
cm0002@sh.itjust.works · 15 days agoVulnerability Report - September 2025plus-squaremessage-squaremessage-square0fedilinkarrow-up10
arrow-up10message-squareVulnerability Report - September 2025plus-squarecm0002@sh.itjust.works · 15 days agomessage-square0fedilink
randomname@scribe.disroot.org · 15 days agoJapan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shippingplus-squareindustrialcyber.coexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkJapan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shippingplus-squareindustrialcyber.corandomname@scribe.disroot.org · 15 days agomessage-square0fedilink
randomname@scribe.disroot.org · 15 days agoAttacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warnsplus-squarewww.cyber.gc.caexternal-linkmessage-square0fedilinkarrow-up10
arrow-up10external-linkAttacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warnsplus-squarewww.cyber.gc.carandomname@scribe.disroot.org · 15 days agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.org · 15 days agoState-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure" as Russia, China-aligned groups representing 90% of activities, EU report showsplus-squarebreached.companyexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkState-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure" as Russia, China-aligned groups representing 90% of activities, EU report showsplus-squarebreached.companyHotznplotzn@lemmy.sdf.org · 15 days agomessage-square0fedilink
PhilipTheBucket@piefed.socialEnglish · 17 days agoUS gov shutdown leaves IT projects hanging, security defenders a skeleton crewplus-squarego.theregister.comexternal-linkmessage-square2fedilinkarrow-up11
arrow-up11external-linkUS gov shutdown leaves IT projects hanging, security defenders a skeleton crewplus-squarego.theregister.comPhilipTheBucket@piefed.socialEnglish · 17 days agomessage-square2fedilink
PhilipTheBucket@piefed.socialEnglish · 17 days ago'Delightful' Red Hat OpenShift AI bug allows full takeoverplus-squarego.theregister.comexternal-linkmessage-square1fedilinkarrow-up11
arrow-up11external-link'Delightful' Red Hat OpenShift AI bug allows full takeoverplus-squarego.theregister.comPhilipTheBucket@piefed.socialEnglish · 17 days agomessage-square1fedilink
shellsharks@infosec.pubM · 17 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square2fedilinkarrow-up11
arrow-up11message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 17 days agomessage-square2fedilink
Hotznplotzn@lemmy.sdf.org · 17 days agoChinese hacking group ‘Phantom Taurus’ targets governmentsplus-squarewww.telecomstechnews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkChinese hacking group ‘Phantom Taurus’ targets governmentsplus-squarewww.telecomstechnews.comHotznplotzn@lemmy.sdf.org · 17 days agomessage-square0fedilink
cm0002@piefed.worldEnglish · 18 days ago50K Cisco firewalls remain vulnerable to advanced attacksplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-link50K Cisco firewalls remain vulnerable to advanced attacksplus-squarewww.theregister.comcm0002@piefed.worldEnglish · 18 days agomessage-square0fedilink