I eat wordsMAEnglish · 7 days agoGibler - How to 10X Your Securityplus-squaredocs.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down12
arrow-up1-1arrow-down1external-linkGibler - How to 10X Your Securityplus-squaredocs.google.comI eat wordsMAEnglish · 7 days agomessage-square0fedilink
KasTasEnglish · 14 days agoWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comKasTasEnglish · 14 days agomessage-square0fedilink
I eat wordsMAEnglish · 21 days agoThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comI eat wordsMAEnglish · 21 days agomessage-square0fedilink
KasTasEnglish · 24 days agoAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netKasTasEnglish · 24 days agomessage-square0fedilink
I eat wordsMAEnglish · 1 month agoArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgI eat wordsMAEnglish · 1 month agomessage-square0fedilink
I eat wordsMAEnglish · 3 months agoSecurity Advisory YSA-2024-03plus-squarewww.yubico.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkSecurity Advisory YSA-2024-03plus-squarewww.yubico.comI eat wordsMAEnglish · 3 months agomessage-square0fedilink
RGBEnglish · 3 months agoChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comRGBEnglish · 3 months agomessage-square0fedilink
I eat wordsMAEnglish · 3 months agoIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comexternal-linkmessage-square5fedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comI eat wordsMAEnglish · 3 months agomessage-square5fedilink
I eat wordsMAEnglish · 3 months agoHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comI eat wordsMAEnglish · 3 months agomessage-square0fedilink
I eat wordsMAEnglish · 3 months agoWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comI eat wordsMAEnglish · 3 months agomessage-square0fedilink
I eat wordsMAEnglish · 4 months agooss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkoss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgI eat wordsMAEnglish · 4 months agomessage-square0fedilink
I eat wordsMAEnglish · 4 months agoMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comI eat wordsMAEnglish · 4 months agomessage-square0fedilink
I eat wordsMAEnglish · 5 months agoA Leak of Biometric Police Data Is a Sign of Things to Comeplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkA Leak of Biometric Police Data Is a Sign of Things to Comeplus-squarewww.wired.comI eat wordsMAEnglish · 5 months agomessage-square0fedilink
I eat wordsMAEnglish · 5 months agoWhen Regulation Encourages ISPs to Hack Their Customersplus-squarenews.risky.bizexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkWhen Regulation Encourages ISPs to Hack Their Customersplus-squarenews.risky.bizI eat wordsMAEnglish · 5 months agomessage-square0fedilink
I eat wordsMAEnglish · 5 months agoregreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)plus-squarewww.qualys.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkregreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)plus-squarewww.qualys.comI eat wordsMAEnglish · 5 months agomessage-square0fedilink
I eat wordsMAEnglish · 5 months agoPluralistic: The reason you can’t buy a car is the same reason that your health insurer let hackers dox you (28 Jun 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkPluralistic: The reason you can’t buy a car is the same reason that your health insurer let hackers dox you (28 Jun 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netI eat wordsMAEnglish · 5 months agomessage-square0fedilink
I eat wordsMAEnglish · 6 months agoHow AI will change democracyplus-squarecyberscoop.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkHow AI will change democracyplus-squarecyberscoop.comI eat wordsMAEnglish · 6 months agomessage-square1fedilink
I eat wordsMAEnglish · 6 months ago2023 Biography of Marian Rejewski: “The First Enigma Codebreaker” | flyingpenguinplus-squarewww.flyingpenguin.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link2023 Biography of Marian Rejewski: “The First Enigma Codebreaker” | flyingpenguinplus-squarewww.flyingpenguin.comI eat wordsMAEnglish · 6 months agomessage-square0fedilink
I eat wordsMAEnglish · 6 months agoGoogle Patches Fourth Chrome Zero-Day in Two Weeksplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkGoogle Patches Fourth Chrome Zero-Day in Two Weeksplus-squarewww.securityweek.comI eat wordsMAEnglish · 6 months agomessage-square0fedilink
I eat wordsMAEnglish · 6 months agoEnhancing Open Source Security: Introducing Siren by OpenSSF – Open Source Security Foundationplus-squareopenssf.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEnhancing Open Source Security: Introducing Siren by OpenSSF – Open Source Security Foundationplus-squareopenssf.orgI eat wordsMAEnglish · 6 months agomessage-square0fedilink