overflow@lemmy.ml · 4 months agoSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comoverflow@lemmy.ml · 4 months agomessage-square0fedilink
NinjaZ@infosec.pub · 4 months agoDebunking the Myth of “Anonymous” Dataplus-squarewww.eff.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDebunking the Myth of “Anonymous” Dataplus-squarewww.eff.orgNinjaZ@infosec.pub · 4 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agoResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agomessage-square0fedilink
NinjaZ@infosec.pub · 4 months agoHow the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putinplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putinplus-squarewww.wired.comNinjaZ@infosec.pub · 4 months agomessage-square0fedilink
wizardbeard@lemmy.dbzer0.comEnglish · 4 months agoNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govwizardbeard@lemmy.dbzer0.comEnglish · 4 months agomessage-square0fedilink
NinjaZ@infosec.pub · 4 months agoVehicle thefts - Insecure vehicles should be banned, not security tools like the Flipper Zeroplus-squaresaveflipper.caexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVehicle thefts - Insecure vehicles should be banned, not security tools like the Flipper Zeroplus-squaresaveflipper.caNinjaZ@infosec.pub · 4 months agomessage-square0fedilink
NinjaZ@infosec.pub · 4 months agoSecurity Listplus-squaresecurity-list.js.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity Listplus-squaresecurity-list.js.orgNinjaZ@infosec.pub · 4 months agomessage-square0fedilink
rhabarba@feddit.deEnglish · 4 months agoThings that have been happening to me too often latelyplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareThings that have been happening to me too often latelyplus-squarerhabarba@feddit.deEnglish · 4 months agomessage-square0fedilink
FlappyBubble@lemmy.ml · 5 months agoIf the Internet where to be redesigned, what would you change to improve security?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareIf the Internet where to be redesigned, what would you change to improve security?plus-squareFlappyBubble@lemmy.ml · 5 months agomessage-square0fedilink
NinjaZ@infosec.pub · 5 months agoWhy Bloat Is Still Software’s Biggest Vulnerabilityplus-squarespectrum.ieee.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhy Bloat Is Still Software’s Biggest Vulnerabilityplus-squarespectrum.ieee.orgNinjaZ@infosec.pub · 5 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 months agoThis iOS Trojan Is Harvesting Facial-Recognition Dataplus-squarewww.pcmag.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThis iOS Trojan Is Harvesting Facial-Recognition Dataplus-squarewww.pcmag.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 months agomessage-square0fedilink
Helix 🧬@feddit.deEnglish · 5 months agoCritical Outlook RCE with CVSS3.1 (badness) score of 9.8plus-squareinfosec.exchangeexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Outlook RCE with CVSS3.1 (badness) score of 9.8plus-squareinfosec.exchangeHelix 🧬@feddit.deEnglish · 5 months agomessage-square0fedilink
FirstCircle@lemmy.mlEnglish · 5 months agoTwilio Authy Desktop app, new death dateplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareTwilio Authy Desktop app, new death dateplus-squareFirstCircle@lemmy.mlEnglish · 5 months agomessage-square0fedilink
NinjaZ@infosec.pub · 5 months agoNearly half the French population have data nabbed in massive breachplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNearly half the French population have data nabbed in massive breachplus-squarewww.theregister.comNinjaZ@infosec.pub · 5 months agomessage-square0fedilink
NinjaZ@infosec.pub · 5 months agoChinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decadeplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decadeplus-squarethehackernews.comNinjaZ@infosec.pub · 5 months agomessage-square0fedilink
BlanK0@lemmy.ml · 5 months agoLinux Foundation Launches Initiative to Advance Post-Quantum Cryptography | L...plus-squarelinuxsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLinux Foundation Launches Initiative to Advance Post-Quantum Cryptography | L...plus-squarelinuxsecurity.comBlanK0@lemmy.ml · 5 months agomessage-square0fedilink
BlanK0@lemmy.ml · 5 months agoGitHub - MISP/MISP: MISP (core software) - Open Source Threat Intelligence and Sharing Platformplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - MISP/MISP: MISP (core software) - Open Source Threat Intelligence and Sharing Platformplus-squaregithub.comBlanK0@lemmy.ml · 5 months agomessage-square0fedilink
BlanK0@lemmy.ml · 5 months agoGitHub - arkime/arkime: Arkime is an open source, large scale, full packet capturing, indexing, and database system.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - arkime/arkime: Arkime is an open source, large scale, full packet capturing, indexing, and database system.plus-squaregithub.comBlanK0@lemmy.ml · 5 months agomessage-square0fedilink
BlanK0@lemmy.ml · 5 months agoCritical vulnerability affecting most Linux distros allows for bootkitsplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical vulnerability affecting most Linux distros allows for bootkitsplus-squarearstechnica.comBlanK0@lemmy.ml · 5 months agomessage-square0fedilink
BlanK0@lemmy.ml · 5 months agoNetherlands reveals Chinese spies attacked its defense deptplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNetherlands reveals Chinese spies attacked its defense deptplus-squarewww.theregister.comBlanK0@lemmy.ml · 5 months agomessage-square0fedilink