codeinabox@programming.devEnglish · 4日前Minimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comexternal-linkmessage-square5linkfedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkMinimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comcodeinabox@programming.devEnglish · 4日前message-square5linkfedilink
Innerworld@lemmy.worldEnglish · 1日前Google rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up12arrow-down13
arrow-up1-1arrow-down1external-linkGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comInnerworld@lemmy.worldEnglish · 1日前message-square1linkfedilink
codeinabox@programming.devEnglish · 3日前Package Security Problems for AI Agentsplus-squarenesbitt.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkPackage Security Problems for AI Agentsplus-squarenesbitt.iocodeinabox@programming.devEnglish · 3日前message-square0linkfedilink
codeinabox@programming.devEnglish · 4日前Assessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comexternal-linkmessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAssessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comcodeinabox@programming.devEnglish · 4日前message-square2linkfedilink
buskill@lemdro.idEnglish · 4日前Bounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkBounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inbuskill@lemdro.idEnglish · 4日前message-square0linkfedilink
codeinabox@programming.devEnglish · 7日前OpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkOpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comcodeinabox@programming.devEnglish · 7日前message-square0linkfedilink
codeinabox@programming.devEnglish · 8日前Stop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.meexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkStop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.mecodeinabox@programming.devEnglish · 8日前message-square0linkfedilink
codeinabox@programming.devEnglish · 8日前Don’t let A.I. read your .env filesplus-squarefiliphric.comexternal-linkmessage-square4linkfedilinkarrow-up118arrow-down14
arrow-up114arrow-down1external-linkDon’t let A.I. read your .env filesplus-squarefiliphric.comcodeinabox@programming.devEnglish · 8日前message-square4linkfedilink
Artwork@lemmy.worldEnglish · 10日前AfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.plus-squarelemmy.worldimagemessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1imageAfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.plus-squarelemmy.worldArtwork@lemmy.worldEnglish · 10日前message-square0linkfedilink
codeinabox@programming.devEnglish · 12日前Supply Chain Attack on Axios Pulls Malicious Dependency from npmplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSupply Chain Attack on Axios Pulls Malicious Dependency from npmplus-squaresocket.devcodeinabox@programming.devEnglish · 12日前message-square0linkfedilink
Innerworld@lemmy.worldEnglish · 14日前ShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comInnerworld@lemmy.worldEnglish · 14日前message-square0linkfedilink
Innerworld@lemmy.worldEnglish · 15日前Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comInnerworld@lemmy.worldEnglish · 15日前message-square0linkfedilink
Innerworld@lemmy.worldEnglish · 15日前Iranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkIranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comInnerworld@lemmy.worldEnglish · 15日前message-square0linkfedilink
Kissaki@programming.devEnglish · 15日前Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secretsplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTrivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secretsplus-squaresocket.devKissaki@programming.devEnglish · 15日前message-square0linkfedilink
Kissaki@programming.devEnglish · 15日前Compromised telnyx on PyPI: WAV Steganography and Credential Theftplus-squaresafedep.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCompromised telnyx on PyPI: WAV Steganography and Credential Theftplus-squaresafedep.ioKissaki@programming.devEnglish · 15日前message-square0linkfedilink
Innerworld@lemmy.worldEnglish · 15日前Hackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppersplus-squaresan.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkHackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppersplus-squaresan.comInnerworld@lemmy.worldEnglish · 15日前message-square0linkfedilink
codeinabox@programming.devEnglish · 17日前TeamPCP deploys CanisterWorm on NPM following Trivy compromiseplus-squarewww.aikido.devexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkTeamPCP deploys CanisterWorm on NPM following Trivy compromiseplus-squarewww.aikido.devcodeinabox@programming.devEnglish · 17日前message-square0linkfedilink
Innerworld@lemmy.worldEnglish · 17日前Thousands of websites are accidentally broadcasting sensitive dataplus-squaretechxplore.comexternal-linkmessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThousands of websites are accidentally broadcasting sensitive dataplus-squaretechxplore.comInnerworld@lemmy.worldEnglish · 17日前message-square2linkfedilink
Kissaki@programming.devEnglish · 19日前Delve - Fake Compliance as a Serviceplus-squaredeepdelver.substack.comexternal-linkmessage-square2linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkDelve - Fake Compliance as a Serviceplus-squaredeepdelver.substack.comKissaki@programming.devEnglish · 19日前message-square2linkfedilink
Innerworld@lemmy.worldEnglish · 19日前US State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversariesplus-squareabcnews.comexternal-linkmessage-square2linkfedilinkarrow-up111arrow-down12
arrow-up19arrow-down1external-linkUS State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversariesplus-squareabcnews.comInnerworld@lemmy.worldEnglish · 19日前message-square2linkfedilink