TheDwZ@lemmy.worldEnglish · 6 days agoGraphite, the Israeli spyware acquired by ICEplus-squareenglish.elpais.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGraphite, the Israeli spyware acquired by ICEplus-squareenglish.elpais.comTheDwZ@lemmy.worldEnglish · 6 days agomessage-square0fedilink
TheDwZ@lemmy.worldEnglish · 6 days agoEx-WhatsApp cybersecurity head says Meta endangered billions of users in new suitplus-squarewww.theguardian.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEx-WhatsApp cybersecurity head says Meta endangered billions of users in new suitplus-squarewww.theguardian.comTheDwZ@lemmy.worldEnglish · 6 days agomessage-square0fedilink
Pro@programming.devEnglish · 6 days agoLargest NPM Compromise in History(Packages With Over 2.6 Billion Total Weekly Downloads) - Supply Chain Attackplus-squarewww.aikido.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLargest NPM Compromise in History(Packages With Over 2.6 Billion Total Weekly Downloads) - Supply Chain Attackplus-squarewww.aikido.devPro@programming.devEnglish · 6 days agomessage-square0fedilink
Pro@programming.devEnglish · 6 days agoLookCam App Users Exposed to Critical Security Risksplus-squarepalant.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLookCam App Users Exposed to Critical Security Risksplus-squarepalant.infoPro@programming.devEnglish · 6 days agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 7 days agoCzech cyber agency flags Chinese espionage risks to critical infrastructureplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCzech cyber agency flags Chinese espionage risks to critical infrastructureplus-squaresecurityaffairs.comHotznplotzn@lemmy.sdf.orgEnglish · 7 days agomessage-square0fedilink
Pro@programming.devEnglish · 9 days agoWe Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillanceplus-squarebobdahacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillanceplus-squarebobdahacker.comPro@programming.devEnglish · 9 days agomessage-square0fedilink
Amoxtli@thelemmy.clubEnglish · 9 days agoVirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pagesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pagesplus-squarethehackernews.comAmoxtli@thelemmy.clubEnglish · 9 days agomessage-square0fedilink
return2ozma@lemmy.worldEnglish · 10 days agoSextortion with a twist: Spyware takes webcam pics of users watching pornplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSextortion with a twist: Spyware takes webcam pics of users watching pornplus-squarearstechnica.comreturn2ozma@lemmy.worldEnglish · 10 days agomessage-square0fedilink
Nemeski@mander.xyzEnglish · 10 days agoChess.com confirms data breachplus-squarewww.neowin.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChess.com confirms data breachplus-squarewww.neowin.netNemeski@mander.xyzEnglish · 10 days agomessage-square0fedilink
Nemeski@mander.xyzEnglish · 10 days agoZero-day vulnerability discovered in TP-Link routersplus-squarewww.techzine.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZero-day vulnerability discovered in TP-Link routersplus-squarewww.techzine.euNemeski@mander.xyzEnglish · 10 days agomessage-square0fedilink
Pro@programming.devEnglish · 10 days agoChina-aligned crew poisons Windows servers to manipulate Google resultsplus-squarewww.welivesecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChina-aligned crew poisons Windows servers to manipulate Google resultsplus-squarewww.welivesecurity.comPro@programming.devEnglish · 10 days agomessage-square0fedilink
Jerry on PieFed@feddit.onlineEnglish · 10 days agoAI hacking. Downloading images can allow your computer to be hijackedplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAI hacking. Downloading images can allow your computer to be hijackedplus-squareJerry on PieFed@feddit.onlineEnglish · 10 days agomessage-square0fedilink
Jerry on PieFed@feddit.onlineEnglish · 13 days agoMy Pixel 10 warned me 8 times in 30-minutes that there was a rogue connection made. Deeply concerningplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareMy Pixel 10 warned me 8 times in 30-minutes that there was a rogue connection made. Deeply concerningplus-squareJerry on PieFed@feddit.onlineEnglish · 13 days agomessage-square0fedilink
Pro@programming.devEnglish · 13 days ago[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing methodplus-squarewww.usenix.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing methodplus-squarewww.usenix.orgPro@programming.devEnglish · 13 days agomessage-square0fedilink
Pro@programming.devEnglish · 14 days agoDDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globallyplus-squarewww.netscout.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globallyplus-squarewww.netscout.comPro@programming.devEnglish · 14 days agomessage-square0fedilink
RagnarokOnline@programming.devEnglish · 16 days agoPizza Intelligence - How Pentagon pizza orders correlate with big newsplus-squarepizzint.watchexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPizza Intelligence - How Pentagon pizza orders correlate with big newsplus-squarepizzint.watchRagnarokOnline@programming.devEnglish · 16 days agomessage-square0fedilink
Pro@programming.devEnglish · 16 days agoDHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access Federal Emergency Management Agency (FEMA) networksplus-squarewww.dhs.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access Federal Emergency Management Agency (FEMA) networksplus-squarewww.dhs.govPro@programming.devEnglish · 16 days agomessage-square0fedilink
Amoxtli@thelemmy.clubEnglish · 16 days agoMalicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentialsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentialsplus-squarethehackernews.comAmoxtli@thelemmy.clubEnglish · 16 days agomessage-square0fedilink
Pro@programming.devEnglish · 17 days agoI Hacked BellaBot and Every Robot from China's Biggest Robotics Company (Pudu Only Fixed It When I Told Their Clients)plus-squarebobdahacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkI Hacked BellaBot and Every Robot from China's Biggest Robotics Company (Pudu Only Fixed It When I Told Their Clients)plus-squarebobdahacker.comPro@programming.devEnglish · 17 days agomessage-square0fedilink
Amoxtli@thelemmy.clubEnglish · 17 days agoTamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookiesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookiesplus-squarethehackernews.comAmoxtli@thelemmy.clubEnglish · 17 days agomessage-square0fedilink