floofloof@lemmy.ca · 3 days agoMicrosoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flawplus-squarewww.forbes.comexternal-linkmessage-square2linkfedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkMicrosoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flawplus-squarewww.forbes.comfloofloof@lemmy.ca · 3 days agomessage-square2linkfedilink
Kissaki@programming.dev · 3 days agoBreaking Bitlocker - Bypassing the Windows Disk Encryptionplus-squarewww.youtube.comexternal-linkmessage-square6linkfedilinkarrow-up122arrow-down11
arrow-up121arrow-down1external-linkBreaking Bitlocker - Bypassing the Windows Disk Encryptionplus-squarewww.youtube.comKissaki@programming.dev · 3 days agomessage-square6linkfedilink
cm0002@libretechni.ca · 3 days agoVulnerability-Lookup 2.21.0plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVulnerability-Lookup 2.21.0plus-squarewww.vulnerability-lookup.orgcm0002@libretechni.ca · 3 days agomessage-square0linkfedilink
cm0002@lemmings.world · 7 days agoChina bans U.S. and Israeli cybersecurity software over security concernsplus-squaresecurityaffairs.comexternal-linkmessage-square2linkfedilinkarrow-up141arrow-down10
arrow-up141arrow-down1external-linkChina bans U.S. and Israeli cybersecurity software over security concernsplus-squaresecurityaffairs.comcm0002@lemmings.world · 7 days agomessage-square2linkfedilink
cm0002@lemmings.world · 6 days agoGNU InetUtils Security Advisory: remote authentication by-pass in telnetdplus-squarevulnerability.circl.luexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkGNU InetUtils Security Advisory: remote authentication by-pass in telnetdplus-squarevulnerability.circl.lucm0002@lemmings.world · 6 days agomessage-square0linkfedilink
shellsharksMA · 5 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square3linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharksMA · 5 days agomessage-square3linkfedilink
cm0002@lemmings.world · 6 days agoDissecting CrashFix: KongTuke's New Toy | Huntressplus-squarewww.huntress.comexternal-linkmessage-square19linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkDissecting CrashFix: KongTuke's New Toy | Huntressplus-squarewww.huntress.comcm0002@lemmings.world · 6 days agomessage-square19linkfedilink
BusKill@lemmy.sdf.org · 6 days agoBusKill Project Annual Report (2025) - Open Source Dead Man Switchplus-squarewww.buskill.inexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down13
arrow-up13arrow-down1external-linkBusKill Project Annual Report (2025) - Open Source Dead Man Switchplus-squarewww.buskill.inBusKill@lemmy.sdf.org · 6 days agomessage-square0linkfedilink
cm0002@lemmy.cafe · 9 days agoMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comexternal-linkmessage-square1linkfedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comcm0002@lemmy.cafe · 9 days agomessage-square1linkfedilink
cm0002 · 10 days agoA 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zeroplus-squareprojectzero.googleexternal-linkmessage-square5linkfedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkA 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zeroplus-squareprojectzero.googlecm0002 · 10 days agomessage-square5linkfedilink
shellsharksMA · 12 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharksMA · 12 days agomessage-square0linkfedilink
cm0002 · 13 days agoA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgcm0002 · 13 days agomessage-square0linkfedilink
cm0002@suppo.fi · 14 days agoVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgcm0002@suppo.fi · 14 days agomessage-square0linkfedilink
Tony Bark@pawb.social · 14 days agoUniversity of Hawaii Cancer Center hit by ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkUniversity of Hawaii Cancer Center hit by ransomware attackplus-squarewww.bleepingcomputer.comTony Bark@pawb.social · 14 days agomessage-square0linkfedilink
Sepia@mander.xyz · 16 days agoCyberwarfare: China-Linked UAT-7290 usually active in South Asia expands its espionage-focused intrusions into Southeastern Europe, targeting telecomsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCyberwarfare: China-Linked UAT-7290 usually active in South Asia expands its espionage-focused intrusions into Southeastern Europe, targeting telecomsplus-squarethehackernews.comSepia@mander.xyz · 16 days agomessage-square0linkfedilink
cm0002@toast.ooo · 18 days agoNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comcm0002@toast.ooo · 18 days agomessage-square0linkfedilink
cm0002@literature.cafe · 18 days agoDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comcm0002@literature.cafe · 18 days agomessage-square0linkfedilink
cm0002@literature.cafe · 18 days agoChina hacked email systems of US congressional committee staffplus-squarewww.ft.comexternal-linkmessage-square0linkfedilinkarrow-up160arrow-down11
arrow-up159arrow-down1external-linkChina hacked email systems of US congressional committee staffplus-squarewww.ft.comcm0002@literature.cafe · 18 days agomessage-square0linkfedilink
cm0002@literature.cafe · 20 days ago"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-link"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.decm0002@literature.cafe · 20 days agomessage-square0linkfedilink
cm0002@literature.cafe · 20 days agoBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.deexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.decm0002@literature.cafe · 20 days agomessage-square1linkfedilink