Deep@mander.xyz · 4 hours agoGTFOBins- curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systemsplus-squaregtfobins.orgexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkGTFOBins- curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systemsplus-squaregtfobins.orgDeep@mander.xyz · 4 hours agomessage-square0linkfedilink
shellsharks@infosec.pubM · 21 hours agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 21 hours agomessage-square0linkfedilink
cm0002@libretechni.ca · 5 days agoBitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Attackplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up149arrow-down10
arrow-up149arrow-down1external-linkBitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Attackplus-squaresocket.devcm0002@libretechni.ca · 5 days agomessage-square0linkfedilink
Sepia@mander.xyz · 4 days agoChinese attackers are pwning your infrastructure to use in attacks, 10 countries warnplus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up117arrow-down12
arrow-up115arrow-down1external-linkChinese attackers are pwning your infrastructure to use in attacks, 10 countries warnplus-squarewww.theregister.comSepia@mander.xyz · 4 days agomessage-square1linkfedilink
monica_b1998@lemmy.world · 4 days agoPLC Cybersecurity — Securing Industrial Control Systemsplus-squareslicker.meexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkPLC Cybersecurity — Securing Industrial Control Systemsplus-squareslicker.memonica_b1998@lemmy.world · 4 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 4 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square2linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 4 days agomessage-square2linkfedilink
floofloof@lemmy.ca · 6 days agoIran claims US exploited networking equipment backdoors during strikesplus-squarewww.tomshardware.comexternal-linkmessage-square1linkfedilinkarrow-up146arrow-down11
arrow-up145arrow-down1external-linkIran claims US exploited networking equipment backdoors during strikesplus-squarewww.tomshardware.comfloofloof@lemmy.ca · 6 days agomessage-square1linkfedilink
randomname@scribe.disroot.org · 6 days agoIran, Russia and China behind most major cyberattacks on UK, security chief warnsplus-squarewww.the-independent.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkIran, Russia and China behind most major cyberattacks on UK, security chief warnsplus-squarewww.the-independent.comrandomname@scribe.disroot.org · 6 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 6 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 6 days agomessage-square1linkfedilink
monica_b1998@lemmy.world · 7 days agoWireshark tutorial: Capture vs. Display Filtersplus-squareslicker.meexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWireshark tutorial: Capture vs. Display Filtersplus-squareslicker.memonica_b1998@lemmy.world · 7 days agomessage-square1linkfedilink
cm0002@libretechni.ca · 7 days agoQuantum Computers Are Not a Threat to 128-bit Symmetric Keysplus-squarewords.filippo.ioexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down12
arrow-up18arrow-down1external-linkQuantum Computers Are Not a Threat to 128-bit Symmetric Keysplus-squarewords.filippo.iocm0002@libretechni.ca · 7 days agomessage-square0linkfedilink
beep@piefed.worldEnglish · 7 days agoFakeWallet cryptostealer propagating via iOS App Store applicationsplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkFakeWallet cryptostealer propagating via iOS App Store applicationsplus-squaresecurelist.combeep@piefed.worldEnglish · 7 days agomessage-square0linkfedilink
cm0002@libretechni.ca · 9 days agoMicrosoft's Silent Lockout: Why WireGuard, VeraCrypt & Windscribe Can No Longer Update Windows Usersplus-squaretechlore.techexternal-linkmessage-square8linkfedilinkarrow-up173arrow-down17
arrow-up166arrow-down1external-linkMicrosoft's Silent Lockout: Why WireGuard, VeraCrypt & Windscribe Can No Longer Update Windows Usersplus-squaretechlore.techcm0002@libretechni.ca · 9 days agomessage-square8linkfedilink
beep@piefed.worldEnglish · 10 days agoHTTP desync in Discord's media proxy: Spying on a whole platformplus-squaretmctmt.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHTTP desync in Discord's media proxy: Spying on a whole platformplus-squaretmctmt.combeep@piefed.worldEnglish · 10 days agomessage-square0linkfedilink
beep@piefed.worldEnglish · 10 days agoNIST gives up enriching most CVEsplus-squarerisky.bizexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNIST gives up enriching most CVEsplus-squarerisky.bizbeep@piefed.worldEnglish · 10 days agomessage-square0linkfedilink
cm0002@lemdro.id · 11 days agoClaude Opus wrote a Chrome exploit for $2,283plus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkClaude Opus wrote a Chrome exploit for $2,283plus-squarewww.theregister.comcm0002@lemdro.id · 11 days agomessage-square1linkfedilink
monica_b1998@lemmy.world · 11 days agoThree Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatchedplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up173arrow-down10
arrow-up173arrow-down1external-linkThree Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatchedplus-squarethehackernews.commonica_b1998@lemmy.world · 11 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 11 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 11 days agomessage-square0linkfedilink
beep@piefed.worldEnglish · 11 days ago108 Chrome extensions caught stealing user data and hijacking sessionsplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down13
arrow-up19arrow-down1external-link108 Chrome extensions caught stealing user data and hijacking sessionsplus-squaresocket.devbeep@piefed.worldEnglish · 11 days agomessage-square0linkfedilink
beep@piefed.worldEnglish · 11 days agoFiverr left customer files public and searchable on Googleplus-squarenews.ycombinator.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down13
arrow-up15arrow-down1external-linkFiverr left customer files public and searchable on Googleplus-squarenews.ycombinator.combeep@piefed.worldEnglish · 11 days agomessage-square0linkfedilink