☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 days agoWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgexternal-linkmessage-square6linkfedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 days agomessage-square6linkfedilink
HiddenLayer555@lemmy.mlEnglish · edit-28 days agoPeople online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?plus-squaremessage-squaremessage-square6linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1message-squarePeople online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?plus-squareHiddenLayer555@lemmy.mlEnglish · edit-28 days agomessage-square6linkfedilink
Cedric@lemmy.mlEnglish · 9 days agoVulnerability-Lookup 2.20.0plus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareVulnerability-Lookup 2.20.0plus-squareCedric@lemmy.mlEnglish · 9 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 11 days agoGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGPU Efficiency in VLAI Model Trainingplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 11 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 12 days agoPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkPornHub extorted after hackers steal Premium member activity dataplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 12 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 12 days agoSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.luexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSecurity content of iOS 26.2 and iPadOS 26.2plus-squaresocial.circl.luCedric@lemmy.mlEnglish · 12 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 14 days agoFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkFake ‘One Battle After Another’ torrent hides malware in subtitlesplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 14 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 14 days agoHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.devexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHow we got hit by Shai-Hulud: A complete post-mortemplus-squaretrigger.dev☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 14 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 18 days agoGitLab discovers widespread npm supply chain attackplus-squareabout.gitlab.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkGitLab discovers widespread npm supply chain attackplus-squareabout.gitlab.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 18 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 18 days agoVulnerability-Lookup 2.19.0plus-squarediscourse.ossbase.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability-Lookup 2.19.0plus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 18 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agoTo Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spywareplus-squaresecuritylab.amnesty.orgexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTo Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spywareplus-squaresecuritylab.amnesty.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 24 days agoCloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnetsplus-squareblog.cloudflare.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnetsplus-squareblog.cloudflare.comZerush@lemmy.ml · 24 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 26 days agoEnd-of-Year Threat Intelligence Sightings Forecastplus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareEnd-of-Year Threat Intelligence Sightings Forecastplus-squareCedric@lemmy.mlEnglish · 26 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agooh no, not npm again...plus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down12
arrow-up13arrow-down1external-linkoh no, not npm again...plus-squarewww.youtube.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Zerush@lemmy.ml · 1 month agoCato CTRL™ Threat Research: HashJack - Novel Indirect Prompt Injection Against AI Browser Assistantsplus-squarewww.catonetworks.comexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkCato CTRL™ Threat Research: HashJack - Novel Indirect Prompt Injection Against AI Browser Assistantsplus-squarewww.catonetworks.comZerush@lemmy.ml · 1 month agomessage-square1linkfedilink
Zerush@lemmy.ml · 1 month agoHow Quickly Can AI Crack Your Password?plus-squaremessente.comexternal-linkmessage-square15linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkHow Quickly Can AI Crack Your Password?plus-squaremessente.comZerush@lemmy.ml · 1 month agomessage-square15linkfedilink
NaNin@lemmy.dbzer0.comEnglish · 1 month agoMalicious app developers offering to buy old apps from developers who are no longer active, so they can push malware onto those usersplus-squaresupport.google.comexternal-linkmessage-square5linkfedilinkarrow-up153arrow-down10
arrow-up153arrow-down1external-linkMalicious app developers offering to buy old apps from developers who are no longer active, so they can push malware onto those usersplus-squaresupport.google.comNaNin@lemmy.dbzer0.comEnglish · 1 month agomessage-square5linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month ago3.5 Billion Accounts: Complete WhatsApp Directory Retrieved and Evaluatedplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-link3.5 Billion Accounts: Complete WhatsApp Directory Retrieved and Evaluatedplus-squarewww.heise.de☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoA Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbersplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkA Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbersplus-squarewww.wired.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability-Lookup 2.18.0 - Integration with Rulezetplus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareVulnerability-Lookup 2.18.0 - Integration with Rulezetplus-squareCedric@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink