Tony Bark@pawb.social · 2 days agoNPM package with 56,000 downloads compromises WhatsApp accountsplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkNPM package with 56,000 downloads compromises WhatsApp accountsplus-squaresecurityaffairs.comTony Bark@pawb.social · 2 days agomessage-square0linkfedilink
cm0002@mander.xyz · 5 days agoWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgexternal-linkmessage-square5linkfedilinkarrow-up118arrow-down13
arrow-up115arrow-down1external-linkWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgcm0002@mander.xyz · 5 days agomessage-square5linkfedilink
Onno (VK6FLAB)@lemmy.radio · 9 days agoPrimary time scale failure at NIST Boulder campus; significant impact on NTP servicesplus-squaregroups.google.comexternal-linkmessage-square2linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkPrimary time scale failure at NIST Boulder campus; significant impact on NTP servicesplus-squaregroups.google.comOnno (VK6FLAB)@lemmy.radio · 9 days agomessage-square2linkfedilink
cm0002@no.lastname.nz · 9 days agoNorth Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true locationplus-squarewww.tomshardware.comexternal-linkmessage-square0linkfedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkNorth Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true locationplus-squarewww.tomshardware.comcm0002@no.lastname.nz · 9 days agomessage-square0linkfedilink
tardigrade@scribe.disroot.org · 9 days agoChina-linked hackers exploit insecure setting in Cisco security productsplus-squarewww.cybersecuritydive.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkChina-linked hackers exploit insecure setting in Cisco security productsplus-squarewww.cybersecuritydive.comtardigrade@scribe.disroot.org · 9 days agomessage-square0linkfedilink
cm0002@no.lastname.nz · 10 days agoVulnerability-Lookup 2.20.0plus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareVulnerability-Lookup 2.20.0plus-squarecm0002@no.lastname.nz · 10 days agomessage-square0linkfedilink
cm0002@lemy.lol · 11 days agoNewer RISC-V CPUs Vulnerable To Spectre V1 - Linux Mitigation Patches Postedplus-squarewww.phoronix.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkNewer RISC-V CPUs Vulnerable To Spectre V1 - Linux Mitigation Patches Postedplus-squarewww.phoronix.comcm0002@lemy.lol · 11 days agomessage-square0linkfedilink
Sepia@mander.xyz · 12 days agoChinese espionage crew 'Ink Dragon' expands its snooping activities into European government servers, security researchers sayplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkChinese espionage crew 'Ink Dragon' expands its snooping activities into European government servers, security researchers sayplus-squarewww.theregister.comSepia@mander.xyz · 12 days agomessage-square0linkfedilink
cm0002@lemy.lol · 12 days agoGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgcm0002@lemy.lol · 12 days agomessage-square0linkfedilink
cm0002@literature.cafe · 13 days agoPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comcm0002@literature.cafe · 13 days agomessage-square0linkfedilink
cm0002@literature.cafe · 13 days agoSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.luexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.lucm0002@literature.cafe · 13 days agomessage-square0linkfedilink
cm0002@suppo.fi · 15 days agoFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square12linkfedilinkarrow-up168arrow-down11
arrow-up167arrow-down1external-linkFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.comcm0002@suppo.fi · 15 days agomessage-square12linkfedilink
cm0002@suppo.fi · 15 days agoHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.devexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.devcm0002@suppo.fi · 15 days agomessage-square0linkfedilink
shellsharksMA · 17 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square5linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1message-squareOff-Topic Fridayplus-squareshellsharksMA · 17 days agomessage-square5linkfedilink
Tony Bark@pawb.social · 18 days agoPorn Is Being Injected Into Government Websites Via Malicious PDFsplus-squarewww.404media.coexternal-linkmessage-square5linkfedilinkarrow-up179arrow-down11
arrow-up178arrow-down1external-linkPorn Is Being Injected Into Government Websites Via Malicious PDFsplus-squarewww.404media.coTony Bark@pawb.social · 18 days agomessage-square5linkfedilink
Jonathan S. @lemmy.jtworld.xyz · 18 days agoNew DroidLock malware locks Android devices and demands a ransomplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10cross-posted to: cybersecurity
arrow-up112arrow-down1external-linkNew DroidLock malware locks Android devices and demands a ransomplus-squarewww.bleepingcomputer.comJonathan S. @lemmy.jtworld.xyz · 18 days agomessage-square0linkfedilinkcross-posted to: cybersecurity
Jonathan S. @lemmy.jtworld.xyz · 18 days agoUS banks scramble to assess data theft after hackers breach financial tech firm | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkUS banks scramble to assess data theft after hackers breach financial tech firm | TechCrunchplus-squaretechcrunch.comJonathan S. @lemmy.jtworld.xyz · 18 days agomessage-square0linkfedilink
Jonathan S. @lemmy.jtworld.xyz · 18 days agoContractors with hacking records accused of wiping 96 govt databasesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkContractors with hacking records accused of wiping 96 govt databasesplus-squarewww.bleepingcomputer.comJonathan S. @lemmy.jtworld.xyz · 18 days agomessage-square0linkfedilink
cm0002@lemmy.cafe · 19 days agoGitLab discovers widespread npm supply chain attackplus-squareabout.gitlab.comexternal-linkmessage-square6linkfedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkGitLab discovers widespread npm supply chain attackplus-squareabout.gitlab.comcm0002@lemmy.cafe · 19 days agomessage-square6linkfedilink