Cedric@lemmy.mlEnglish · 16 hours agoA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgCedric@lemmy.mlEnglish · 16 hours agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 day agoVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 1 day agomessage-square0linkfedilink
Zerush@lemmy.ml · 6 days agoDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comZerush@lemmy.ml · 6 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 5 days agoNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comZerush@lemmy.ml · 5 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 days agoChina hacked email systems of US congressional committee staffplus-squarewww.ft.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkChina hacked email systems of US congressional committee staffplus-squarewww.ft.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 days agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · 7 days ago"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-link"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.deArthur Besse@lemmy.mlEnglish · 7 days agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · 7 days agoBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.deexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.deArthur Besse@lemmy.mlEnglish · 7 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 10 days agoThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 10 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agoWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgexternal-linkmessage-square6linkfedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 20 days agomessage-square6linkfedilink
HiddenLayer555@lemmy.mlEnglish · edit-225 days agoPeople online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?plus-squaremessage-squaremessage-square6linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1message-squarePeople online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?plus-squareHiddenLayer555@lemmy.mlEnglish · edit-225 days agomessage-square6linkfedilink
Cedric@lemmy.mlEnglish · 25 days agoVulnerability-Lookup 2.20.0plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareVulnerability-Lookup 2.20.0plus-squareCedric@lemmy.mlEnglish · 25 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 27 days agoGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 27 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 29 days agoPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 29 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 29 days agoSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.luexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.luCedric@lemmy.mlEnglish · 29 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.devexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.dev☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoGitLab discovers widespread npm supply chain attackplus-squareabout.gitlab.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkGitLab discovers widespread npm supply chain attackplus-squareabout.gitlab.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability-Lookup 2.19.0plus-squarediscourse.ossbase.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability-Lookup 2.19.0plus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoTo Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spywareplus-squaresecuritylab.amnesty.orgexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkTo Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spywareplus-squaresecuritylab.amnesty.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Zerush@lemmy.ml · 1 month agoCloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnetsplus-squareblog.cloudflare.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnetsplus-squareblog.cloudflare.comZerush@lemmy.ml · 1 month agomessage-square0linkfedilink