☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agoNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up123
arrow-up123external-linkNew Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacksplus-squarethehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agoHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.comexternal-linkmessage-square4fedilinkarrow-up117
arrow-up117external-linkHow I upgraded my water heater and discovered how bad smart home security can beplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agomessage-square4fedilink
lemmyreader@lemmy.mlEnglish · 2 days agoBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.euexternal-linkmessage-square4fedilinkarrow-up116
arrow-up116external-linkBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.eulemmyreader@lemmy.mlEnglish · 2 days agomessage-square4fedilink
lemmyreader@lemmy.mlEnglish · 8 days ago16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infoexternal-linkmessage-square0fedilinkarrow-up121
arrow-up121external-link16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infolemmyreader@lemmy.mlEnglish · 8 days agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 13 days agoNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comexternal-linkmessage-square22fedilinkarrow-up137
arrow-up137external-linkNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comArthur Besse@lemmy.mlEnglish · 13 days agomessage-square22fedilink
maegul@lemmy.mlEnglish · 17 days agoHow well can an employer be certain of a remote employee's geographical location?plus-squaremessage-square3fedilinkarrow-up117
arrow-up117message-squareHow well can an employer be certain of a remote employee's geographical location?plus-squaremaegul@lemmy.mlEnglish · 17 days agomessage-square3fedilink
lemmyreader@lemmy.mlEnglish · 17 days agoStealing your Telegram account in 10 seconds flatplus-squarelyra.horsemessage-square0fedilinkarrow-up119
arrow-up119external-linkStealing your Telegram account in 10 seconds flatplus-squarelyra.horselemmyreader@lemmy.mlEnglish · 17 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 21 days agoNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up17
arrow-up17external-linkNation-state hackers exploit Cisco firewall 0-days to backdoor government networksplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 21 days agomessage-square1fedilink
t0mri@lemmy.ml · 22 days agoA doubt in encryptionplus-squarelemmy.mlimagemessage-square28fedilinkarrow-up143
arrow-up143imageA doubt in encryptionplus-squarelemmy.mlt0mri@lemmy.ml · 22 days agomessage-square28fedilink
lemmyreader@lemmy.mlEnglish · 23 days agoComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comexternal-linkmessage-square1fedilinkarrow-up119
arrow-up119external-linkComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comlemmyreader@lemmy.mlEnglish · 23 days agomessage-square1fedilink
lemmyreader@lemmy.mlEnglish · 24 days agoPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.aumessage-square5fedilinkarrow-up18
arrow-up18external-linkPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.aulemmyreader@lemmy.mlEnglish · 24 days agomessage-square5fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoA dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHubplus-squaremastodon.socialexternal-linkmessage-square0fedilinkarrow-up16
arrow-up16external-linkA dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHubplus-squaremastodon.social☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 1 month agoAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comexternal-linkmessage-square1fedilinkarrow-up111
arrow-up111external-linkAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comlemmyreader@lemmy.mlEnglish · 1 month agomessage-square1fedilink
lemmyreader@lemmy.mlEnglish · edit-21 month agoPuTTY priority high vulnerability CVE-2024-31497plus-squarehachyderm.iomessage-square3fedilinkarrow-up137
arrow-up137external-linkPuTTY priority high vulnerability CVE-2024-31497plus-squarehachyderm.iolemmyreader@lemmy.mlEnglish · edit-21 month agomessage-square3fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoGmail And YouTube Hackers Bypass Google’s 2FA Account Securityplus-squarewww.forbes.comexternal-linkmessage-square1fedilinkarrow-up122
arrow-up122external-linkGmail And YouTube Hackers Bypass Google’s 2FA Account Securityplus-squarewww.forbes.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square1fedilink
lemmyreader@lemmy.mlEnglish · 1 month agoNew Technique Detected in an Open Source Supply Chain Attackplus-squarecheckmarx.comexternal-linkmessage-square1fedilinkarrow-up118
arrow-up118external-linkNew Technique Detected in an Open Source Supply Chain Attackplus-squarecheckmarx.comlemmyreader@lemmy.mlEnglish · 1 month agomessage-square1fedilink
lemmyreader@lemmy.ml · 1 month agoNew Spectre v2 attack impacts Linux systems on Intel CPUsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up117
arrow-up117external-linkNew Spectre v2 attack impacts Linux systems on Intel CPUsplus-squarewww.bleepingcomputer.comlemmyreader@lemmy.ml · 1 month agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 1 month agoWhere The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Themplus-squarewww.flux.utah.edumessage-square0fedilinkarrow-up16
arrow-up16external-linkWhere The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Themplus-squarewww.flux.utah.edulemmyreader@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Rustmilian@lemmy.worldEnglish · 1 month agoRunning the “Reflections on Trusting Trust” Compilerplus-squareresearch.swtch.commessage-square0fedilinkarrow-up18
arrow-up18external-linkRunning the “Reflections on Trusting Trust” Compilerplus-squareresearch.swtch.comRustmilian@lemmy.worldEnglish · 1 month agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 1 month agoThe Bootstrapping Exam: Escaping from “Trusting Trust”www.devever.netmessage-square1fedilinkarrow-up14
arrow-up14external-linkThe Bootstrapping Exam: Escaping from “Trusting Trust”www.devever.netArthur Besse@lemmy.mlEnglish · 1 month agomessage-square1fedilink