cm0002@lemmy.cafe · 56 minutes agoAct now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blogplus-squaretechcommunity.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAct now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blogplus-squaretechcommunity.microsoft.comcm0002@lemmy.cafe · 56 minutes agomessage-square0linkfedilink
Pro@programming.dev · 13 hours agoGit security vulnerabilities announcedplus-squaregithub.blogexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGit security vulnerabilities announcedplus-squaregithub.blogPro@programming.dev · 13 hours agomessage-square0linkfedilink
cm0002@programming.dev · 17 hours agoVLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classificationplus-squarehuggingface.coexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkVLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classificationplus-squarehuggingface.cocm0002@programming.dev · 17 hours agomessage-square0linkfedilink
Pro@programming.dev · 1 day agoBluetooth flaws could let hackers spy through your microphoneplus-squareinsinuator.netexternal-linkmessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBluetooth flaws could let hackers spy through your microphoneplus-squareinsinuator.netPro@programming.dev · 1 day agomessage-square2linkfedilink
shellsharks@infosec.pubM · 2 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 2 days agomessage-square0linkfedilink
cm0002@lemmy.cafe · 2 days agoMassive spike in use of .es domains for phishing abuseplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkMassive spike in use of .es domains for phishing abuseplus-squarewww.theregister.comcm0002@lemmy.cafe · 2 days agomessage-square0linkfedilink
Pro@programming.dev · 2 days agoHow the Batavia spyware targeting Russian organizations worksplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHow the Batavia spyware targeting Russian organizations worksplus-squaresecurelist.comPro@programming.dev · 2 days agomessage-square0linkfedilink
Pro@programming.dev · 2 days agoBelgium is unsafe for CVDplus-squarefloort.netexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkBelgium is unsafe for CVDplus-squarefloort.netPro@programming.dev · 2 days agomessage-square1linkfedilink
cm0002@lemmy.world · 2 days agoVulnerability Report - June 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVulnerability Report - June 2025plus-squarewww.vulnerability-lookup.orgcm0002@lemmy.world · 2 days agomessage-square0linkfedilink
cm0002@lemmy.world · 6 days agoChatGPT creates phisher’s paradise by serving wrong URLsplus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkChatGPT creates phisher’s paradise by serving wrong URLsplus-squarewww.theregister.comcm0002@lemmy.world · 6 days agomessage-square1linkfedilink
Pro@programming.dev · 6 days agoHow I Scanned all of GitHub’s “Oops Commits” for Leaked Secretsplus-squaretrufflesecurity.comexternal-linkmessage-square0linkfedilinkarrow-up121arrow-down12
arrow-up119arrow-down1external-linkHow I Scanned all of GitHub’s “Oops Commits” for Leaked Secretsplus-squaretrufflesecurity.comPro@programming.dev · 6 days agomessage-square0linkfedilink
Hotznplotzn · 6 days agoFrance: Chinese Hackers Exploited Ivanti Flaw Targeting Government Agencies, Telecoms, Firms In Media, Finance, Transport Sectorsplus-squarewww.bankinfosecurity.comexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkFrance: Chinese Hackers Exploited Ivanti Flaw Targeting Government Agencies, Telecoms, Firms In Media, Finance, Transport Sectorsplus-squarewww.bankinfosecurity.comHotznplotzn · 6 days agomessage-square0linkfedilink
Hotznplotzn · 5 days agoNew Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Findsplus-squarewww.silentpush.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down12
arrow-up16arrow-down1external-linkNew Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Findsplus-squarewww.silentpush.comHotznplotzn · 5 days agomessage-square0linkfedilink
Pro@programming.dev · 6 days agoPro-Russian hacktivism: Shifting alliances, new groups and risksintel471.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPro-Russian hacktivism: Shifting alliances, new groups and risksintel471.comPro@programming.dev · 6 days agomessage-square0linkfedilink
cm0002@lemmy.world · 7 days agoPro-Iran hacktivists borrow from Russia's cyber playbookplus-squarewww.axios.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPro-Iran hacktivists borrow from Russia's cyber playbookplus-squarewww.axios.comcm0002@lemmy.world · 7 days agomessage-square0linkfedilink
Pro@reddthat.com · 7 days agoJasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizationsplus-squarewww.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkJasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizationsplus-squarewww.microsoft.comPro@reddthat.com · 7 days agomessage-square0linkfedilink
cm0002@lemmy.world · 8 days agoUS disrupts North Korean IT worker "laptop farm" scheme in 16 statesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkUS disrupts North Korean IT worker "laptop farm" scheme in 16 statesplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 8 days agomessage-square1linkfedilink
cm0002@lemmy.world · 8 days agoNew FileFix attack runs JScript while bypassing Windows MoTW alertsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNew FileFix attack runs JScript while bypassing Windows MoTW alertsplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 8 days agomessage-square0linkfedilink
cm0002@lemmy.world · 8 days agoBreak The Air Gap With Ultrasoundplus-squarehackaday.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBreak The Air Gap With Ultrasoundplus-squarehackaday.comcm0002@lemmy.world · 8 days agomessage-square0linkfedilink
cm0002@lemmy.world · 9 days agoHikvision Canada ordered to cease operations over security risksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHikvision Canada ordered to cease operations over security risksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 9 days agomessage-square0linkfedilink