Arthur BesseEnglish • 4 days agoNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comexternal-linkmessage-square21fedilinkarrow-up130arrow-down14
arrow-up126arrow-down1external-linkNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comArthur BesseEnglish • 4 days agomessage-square21fedilink
@maegul@lemmy.mlEnglish • 9 days agoHow well can an employer be certain of a remote employee's geographical location?plus-squaremessage-square3fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1message-squareHow well can an employer be certain of a remote employee's geographical location?plus-square@maegul@lemmy.mlEnglish • 9 days agomessage-square3fedilink
lemmyreaderEnglish • 9 days agoStealing your Telegram account in 10 seconds flatplus-squarelyra.horsemessage-square0fedilinkarrow-up117arrow-down12
arrow-up115arrow-down1external-linkStealing your Telegram account in 10 seconds flatplus-squarelyra.horselemmyreaderEnglish • 9 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆English • 12 days agoNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆English • 12 days agomessage-square1fedilink
@t0mri@lemmy.ml • 14 days agoA doubt in encryptionplus-squarelemmy.mlimagemessage-square25fedilinkarrow-up140arrow-down111
arrow-up129arrow-down1imageA doubt in encryptionplus-squarelemmy.ml@t0mri@lemmy.ml • 14 days agomessage-square25fedilink
lemmyreaderEnglish • 14 days agoComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.commessage-square1fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comlemmyreaderEnglish • 14 days agomessage-square1fedilink
lemmyreaderEnglish • 15 days agoPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.aumessage-square5fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.aulemmyreaderEnglish • 15 days agomessage-square5fedilink
☆ Yσɠƚԋσʂ ☆English • 23 days agoA dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHubplus-squaremastodon.socialexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkA dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHubplus-squaremastodon.social☆ Yσɠƚԋσʂ ☆English • 23 days agomessage-square0fedilink
lemmyreaderEnglish • 25 days agoAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comlemmyreaderEnglish • 25 days agomessage-square1fedilink
lemmyreaderEnglish • edit-226 days agoPuTTY priority high vulnerability CVE-2024-31497plus-squarehachyderm.iomessage-square2fedilinkarrow-up135arrow-down11
arrow-up134arrow-down1external-linkPuTTY priority high vulnerability CVE-2024-31497plus-squarehachyderm.iolemmyreaderEnglish • edit-226 days agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆English • 28 days agoGmail And YouTube Hackers Bypass Google’s 2FA Account Securityplus-squarewww.forbes.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down11
arrow-up120arrow-down1external-linkGmail And YouTube Hackers Bypass Google’s 2FA Account Securityplus-squarewww.forbes.com☆ Yσɠƚԋσʂ ☆English • 28 days agomessage-square0fedilink
lemmyreaderEnglish • 29 days agoNew Technique Detected in an Open Source Supply Chain Attackplus-squarecheckmarx.comexternal-linkmessage-square1fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkNew Technique Detected in an Open Source Supply Chain Attackplus-squarecheckmarx.comlemmyreaderEnglish • 29 days agomessage-square1fedilink
lemmyreader • 1 month agoNew Spectre v2 attack impacts Linux systems on Intel CPUsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkNew Spectre v2 attack impacts Linux systems on Intel CPUsplus-squarewww.bleepingcomputer.comlemmyreader • 1 month agomessage-square0fedilink
lemmyreaderEnglish • 1 month agoWhere The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Themplus-squarewww.flux.utah.edumessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkWhere The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Themplus-squarewww.flux.utah.edulemmyreaderEnglish • 1 month agomessage-square0fedilink
RustmilianEnglish • 1 month agoRunning the “Reflections on Trusting Trust” Compilerplus-squareresearch.swtch.commessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkRunning the “Reflections on Trusting Trust” Compilerplus-squareresearch.swtch.comRustmilianEnglish • 1 month agomessage-square0fedilink
Arthur BesseEnglish • 1 month agoThe Bootstrapping Exam: Escaping from “Trusting Trust”www.devever.netmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkThe Bootstrapping Exam: Escaping from “Trusting Trust”www.devever.netArthur BesseEnglish • 1 month agomessage-square1fedilink
RustmilianEnglish • 1 month agoGParted Live Is Now Patched Against the XZ Backdoor, Powered by Linux Kernel 6.7plus-square9to5linux.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkGParted Live Is Now Patched Against the XZ Backdoor, Powered by Linux Kernel 6.7plus-square9to5linux.comRustmilianEnglish • 1 month agomessage-square0fedilink
RustmilianEnglish • 1 month agoThoughts on the xz backdoor: an lzma-rs perspective | Blogplus-squaregendignoux.commessage-square2fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkThoughts on the xz backdoor: an lzma-rs perspective | Blogplus-squaregendignoux.comRustmilianEnglish • 1 month agomessage-square2fedilink
RustmilianEnglish • 1 month agoSecurity advisory for the standard library (CVE-2024-24576)plus-squareblog.rust-lang.orgexternal-linkmessage-square0fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkSecurity advisory for the standard library (CVE-2024-24576)plus-squareblog.rust-lang.orgRustmilianEnglish • 1 month agomessage-square0fedilink
RustmilianEnglish • 1 month agoCritical Rust flaw enables Windows command injection attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkCritical Rust flaw enables Windows command injection attacksplus-squarewww.bleepingcomputer.comRustmilianEnglish • 1 month agomessage-square0fedilink