jokeyrhyme@lemmy.ml · 4 years agoWe desperately need a way to rapidly notify people of high-impact vulnerabilities, so I built one: BugAlert.orgplus-squarepinmattslifebytes.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkWe desperately need a way to rapidly notify people of high-impact vulnerabilities, so I built one: BugAlert.orgplus-squarepinmattslifebytes.comjokeyrhyme@lemmy.ml · 4 years agomessage-square0linkfedilink
strubbl@lemmy.ml · 4 years agoAn extremely casual code review of MetaMask’s cryptoplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkAn extremely casual code review of MetaMask’s cryptoplus-squareblog.cryptographyengineering.comstrubbl@lemmy.ml · 4 years agomessage-square0linkfedilink
GadgeteerZA@lemmy.ml · 4 years agoGermany’s security watchdog finds no evidence of censorship on Xiaomi phones - High time allegations are properly proven or refutedplus-squarewww.xda-developers.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkGermany’s security watchdog finds no evidence of censorship on Xiaomi phones - High time allegations are properly proven or refutedplus-squarewww.xda-developers.comGadgeteerZA@lemmy.ml · 4 years agomessage-square0linkfedilink
fruechtchen@lemmy.ml · 4 years agoI’m harvesting credit card numbers and passwords from your site. Here’s how.plus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkI’m harvesting credit card numbers and passwords from your site. Here’s how.plus-squaremedium.comfruechtchen@lemmy.ml · 4 years agomessage-square0linkfedilink
X_Cli@lemmy.ml · 4 years agoSecure large file decryption using Linux, Go and Naclplus-squarewww.broken-by-design.frexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkSecure large file decryption using Linux, Go and Naclplus-squarewww.broken-by-design.frX_Cli@lemmy.ml · 4 years agomessage-square0linkfedilink
brombek@lemmy.ml · 4 years agoNorton 360 Now Comes With a Cryptominer – Krebs on Securityplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkNorton 360 Now Comes With a Cryptominer – Krebs on Securityplus-squarekrebsonsecurity.combrombek@lemmy.ml · 4 years agomessage-square0linkfedilink
AgreeableLandscape@lemmy.ml · 4 years agoHow did LastPass master passwords get compromised?plus-squarepalant.infoexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHow did LastPass master passwords get compromised?plus-squarepalant.infoAgreeableLandscape@lemmy.ml · 4 years agomessage-square0linkfedilink
AgreeableLandscape@lemmy.ml · 4 years agoDon't copy-paste commands from webpages — you can get hackedplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkDon't copy-paste commands from webpages — you can get hackedplus-squarewww.bleepingcomputer.comAgreeableLandscape@lemmy.ml · 4 years agomessage-square0linkfedilink
yogthos@lemmy.ml · 4 years agoNew Malware Uses SSD Over-Provisioning to Bypass Security Measuresplus-squarewww.tomshardware.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkNew Malware Uses SSD Over-Provisioning to Bypass Security Measuresplus-squarewww.tomshardware.comyogthos@lemmy.ml · 4 years agomessage-square0linkfedilink
apalo@lemmy.ml · 4 years agoHands-on Penetration Testing for Web Applications by Richa Guptaplus-squarewww.perlego.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHands-on Penetration Testing for Web Applications by Richa Guptaplus-squarewww.perlego.comapalo@lemmy.ml · 4 years agomessage-square0linkfedilink
overflow@lemmy.ml · 4 years agoBluetooth reboot of pre-school play phone has privacy flawplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkBluetooth reboot of pre-school play phone has privacy flawplus-squarewww.theregister.comoverflow@lemmy.ml · 4 years agomessage-square0linkfedilink
brombek@lemmy.ml · 4 years agoA deep dive into an NSO zero-click iMessage exploit: Remote Code Executionplus-squaregoogleprojectzero.blogspot.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA deep dive into an NSO zero-click iMessage exploit: Remote Code Executionplus-squaregoogleprojectzero.blogspot.combrombek@lemmy.ml · 4 years agomessage-square0linkfedilink
yogthos@lemmy.ml · 4 years ago[LOG4J2-3230] Certain strings can cause infinite recursionplus-squareissues.apache.orgexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-link[LOG4J2-3230] Certain strings can cause infinite recursionplus-squareissues.apache.orgyogthos@lemmy.ml · 4 years agomessage-square0linkfedilink
PissedConsumer@lemmy.ml · 4 years agoCyber Security Tips: How to Protect Your Privacy Onlineplus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkCyber Security Tips: How to Protect Your Privacy Onlineplus-squarewww.youtube.comPissedConsumer@lemmy.ml · 4 years agomessage-square0linkfedilink
yogthos@lemmy.ml · 4 years agoPatch fixing critical Log4J 0-day has its own vulnerability that’s under exploitplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkPatch fixing critical Log4J 0-day has its own vulnerability that’s under exploitplus-squarearstechnica.comyogthos@lemmy.ml · 4 years agomessage-square0linkfedilink
brombek@lemmy.ml · 4 years agoInside Ireland’s Public Healthcare Ransomware Scareplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkInside Ireland’s Public Healthcare Ransomware Scareplus-squarekrebsonsecurity.combrombek@lemmy.ml · 4 years agomessage-square0linkfedilink
strubbl@lemmy.ml · 4 years agoBlackCat: A New Rust-based Ransomware Malware Spotted in the Wildplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkBlackCat: A New Rust-based Ransomware Malware Spotted in the Wildplus-squarethehackernews.comstrubbl@lemmy.ml · 4 years agomessage-square0linkfedilink
AgreeableLandscape@lemmy.ml · 4 years agoLog4j (CVE-2021-44228) RCE Vulnerability: Exploit demo by Marcus Hutchinsplus-squareyewtu.beexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkLog4j (CVE-2021-44228) RCE Vulnerability: Exploit demo by Marcus Hutchinsplus-squareyewtu.beAgreeableLandscape@lemmy.ml · 4 years agomessage-square0linkfedilink
ericbuijs@lemmy.ml · 4 years agoAs Log4Shell wreaks havoc, payroll service reports ransomware attackplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkAs Log4Shell wreaks havoc, payroll service reports ransomware attackplus-squarearstechnica.comericbuijs@lemmy.ml · 4 years agomessage-square0linkfedilink
yogthos@lemmy.ml · 4 years agoA malicious code string that eventually gets logged by Log4j version 2.0 or higher allow an attacker to load arbitrary Java code on a server and take control of it.plus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkA malicious code string that eventually gets logged by Log4j version 2.0 or higher allow an attacker to load arbitrary Java code on a server and take control of it.plus-squarewww.wired.comyogthos@lemmy.ml · 4 years agomessage-square0linkfedilink