Innerworld@lemmy.worldEnglish · 29 days agoAll US Social Security numbers may need to be changed following a massive breach that is already being investigated as a national threatplus-squarewww.ecoticias.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAll US Social Security numbers may need to be changed following a massive breach that is already being investigated as a national threatplus-squarewww.ecoticias.comInnerworld@lemmy.worldEnglish · 29 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 1 month agoBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 1 month agoHope Is Not a Security Strategy: Why Secure-by-Default Beats Hardeningplus-squaretuananh.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHope Is Not a Security Strategy: Why Secure-by-Default Beats Hardeningplus-squaretuananh.netcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 1 month agoLocal tools should still use vaultsplus-squarepierce.devexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLocal tools should still use vaultsplus-squarepierce.devcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 1 month agoHow recruitment fraud turned cloud IAM into a $2 billion attack surfaceplus-squareventurebeat.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow recruitment fraud turned cloud IAM into a $2 billion attack surfaceplus-squareventurebeat.comcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 1 month agoFrom magic to malware: How OpenClaw's agent skills become an attack surfaceplus-square1password.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFrom magic to malware: How OpenClaw's agent skills become an attack surfaceplus-square1password.comcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 2 months agoCloudflare says it mitigated a 31.4 Tbps DDoS attack from the Aisuru/Kimwolf botnet in December 2025, making it the largest attack ever disclosed publiclyplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCloudflare says it mitigated a 31.4 Tbps DDoS attack from the Aisuru/Kimwolf botnet in December 2025, making it the largest attack ever disclosed publiclyplus-squarewww.bleepingcomputer.comInnerworld@lemmy.worldEnglish · 2 months agomessage-square0linkfedilink
Maximuse@programming.devEnglish · 2 months agoECDSA Encryptionplus-squarecertera.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkECDSA Encryptionplus-squarecertera.comMaximuse@programming.devEnglish · 2 months agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 2 months agoOn the Coming Industrialisation of Exploit Generation with LLMsplus-squaresean.heelan.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOn the Coming Industrialisation of Exploit Generation with LLMsplus-squaresean.heelan.iocodeinabox@programming.devEnglish · 2 months agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 2 months agoThe AI Security Shakedownplus-squareblog.jim-nielsen.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe AI Security Shakedownplus-squareblog.jim-nielsen.comcodeinabox@programming.devEnglish · 2 months agomessage-square0linkfedilink
onlinepersona@programming.devEnglish · 2 months agoI Found a Secret Hacker Team Fighting Cybercrime (they saved $1 billion) | video by NetworkChuck [26:56]plus-squaretube.blueben.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkI Found a Secret Hacker Team Fighting Cybercrime (they saved $1 billion) | video by NetworkChuck [26:56]plus-squaretube.blueben.netonlinepersona@programming.devEnglish · 2 months agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 3 months agoHow to Ruin All of Package Managementplus-squarenesbitt.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Ruin All of Package Managementplus-squarenesbitt.iocodeinabox@programming.devEnglish · 3 months agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 3 months agoLeading Global Research and Advisory Firm Recommends Against Using AI Browsersplus-squareblog.jim-nielsen.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLeading Global Research and Advisory Firm Recommends Against Using AI Browsersplus-squareblog.jim-nielsen.comcodeinabox@programming.devEnglish · 3 months agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 3 months agoSVG Filters - Clickjacking 2.0plus-squarelyra.horseexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSVG Filters - Clickjacking 2.0plus-squarelyra.horsecodeinabox@programming.devEnglish · 3 months agomessage-square0linkfedilink
Pierre-Yves Lapersonne@programming.devEnglish · 4 months agoShai-Hulud round 2 on GitHub, massive leaks of data and propagation of stealerplus-squareabout.gitlab.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10cross-posted to: security@programming.dev
arrow-up11arrow-down1external-linkShai-Hulud round 2 on GitHub, massive leaks of data and propagation of stealerplus-squareabout.gitlab.comPierre-Yves Lapersonne@programming.devEnglish · 4 months agomessage-square0linkfedilinkcross-posted to: security@programming.dev
Kissaki@programming.devEnglish · 4 months agoWe Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)plus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWe Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)plus-squarewww.youtube.comKissaki@programming.devEnglish · 4 months agomessage-square0linkfedilink
Michael Altfield@lemmy.vgEnglish · 4 months agoHow to check if Tor Onion Service is alive?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow to check if Tor Onion Service is alive?plus-squareMichael Altfield@lemmy.vgEnglish · 4 months agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 6 months agoThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effortplus-squarefastcode.ioKissaki@programming.devEnglish · 6 months agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 10 months agoChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Codeplus-squarelinuxiac.comKissaki@programming.devEnglish · 10 months agomessage-square0linkfedilink