cm0002@lemmings.world · 1 day agoTwo different attackers poisoned popular open source tools - and showed us the future of supply chain compromiseplus-squarewww.theregister.comexternal-linkmessage-square2linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkTwo different attackers poisoned popular open source tools - and showed us the future of supply chain compromiseplus-squarewww.theregister.comcm0002@lemmings.world · 1 day agomessage-square2linkfedilink
cm0002@lemmings.world · 2 days agoSupply chain nightmare: How Rust will be attacked and what we can do to mitigate the inevitableplus-squarekerkour.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkSupply chain nightmare: How Rust will be attacked and what we can do to mitigate the inevitableplus-squarekerkour.comcm0002@lemmings.world · 2 days agomessage-square0linkfedilink
cm0002@infosec.pub · 3 days agoFBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Databaseplus-squarewww.404media.coexternal-linkmessage-square9linkfedilinkarrow-up160arrow-down12
arrow-up158arrow-down1external-linkFBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Databaseplus-squarewww.404media.cocm0002@infosec.pub · 3 days agomessage-square9linkfedilink
cm0002@lemmings.world · 1 day agoAI Cybersecurity After Mythos: The Jagged Frontierplus-squareaisle.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAI Cybersecurity After Mythos: The Jagged Frontierplus-squareaisle.comcm0002@lemmings.world · 1 day agomessage-square0linkfedilink
cm0002@lemmings.world · 2 days agoHWMonitor & CPU-Z users were exposed to malware through fake downloads after CPUID breachplus-squarealternativeto.netexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHWMonitor & CPU-Z users were exposed to malware through fake downloads after CPUID breachplus-squarealternativeto.netcm0002@lemmings.world · 2 days agomessage-square0linkfedilink
Innerworld@lemmy.world · 2 days agoGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down12cross-posted to: cybersecurity@infosec.pub
arrow-up110arrow-down1external-linkGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comInnerworld@lemmy.world · 2 days agomessage-square0linkfedilinkcross-posted to: cybersecurity@infosec.pub
Deebster@infosec.pub · 3 days agoCPUID hijacked to serve malware as HWMonitor downloadsplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up123arrow-down10cross-posted to: cybersecurity@infosec.pub
arrow-up123arrow-down1external-linkCPUID hijacked to serve malware as HWMonitor downloadsplus-squarewww.theregister.comDeebster@infosec.pub · 3 days agomessage-square0linkfedilinkcross-posted to: cybersecurity@infosec.pub
astrobird@thelemmy.club · 2 days agour best techno-babble to bypass clueless auditors?plus-squaredev.toexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkur best techno-babble to bypass clueless auditors?plus-squaredev.toastrobird@thelemmy.club · 2 days agomessage-square0linkfedilink
cm0002@infosec.pub · 4 days agoMicrosoft BANNED WireGuard, VeraCrypt & Windscribe With Zero Warningplus-squarewww.youtube.comexternal-linkmessage-square5linkfedilinkarrow-up124arrow-down110
arrow-up114arrow-down1external-linkMicrosoft BANNED WireGuard, VeraCrypt & Windscribe With Zero Warningplus-squarewww.youtube.comcm0002@infosec.pub · 4 days agomessage-square5linkfedilink
floofloof@lemmy.ca · 7 days agoAdobe modifies hosts file to detect whether Creative Cloud is installedplus-squarewww.osnews.comexternal-linkmessage-square10linkfedilinkarrow-up191arrow-down10
arrow-up191arrow-down1external-linkAdobe modifies hosts file to detect whether Creative Cloud is installedplus-squarewww.osnews.comfloofloof@lemmy.ca · 7 days agomessage-square10linkfedilink
cm0002@infosec.pub · 4 days agoVulnerability-Lookup 4.4.0plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVulnerability-Lookup 4.4.0plus-squaregithub.comcm0002@infosec.pub · 4 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 5 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 5 days agomessage-square1linkfedilink
cm0002@lemy.lol · 7 days agoNew multilingual severity classifiers for vulnerability analysisplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew multilingual severity classifiers for vulnerability analysisplus-squarewww.vulnerability-lookup.orgcm0002@lemy.lol · 7 days agomessage-square0linkfedilink
cm0002@lemmings.world · 10 days agoCNVD Severity Classification and RMSV Effects: Honest Metrics & Data Leakageplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCNVD Severity Classification and RMSV Effects: Honest Metrics & Data Leakageplus-squarewww.vulnerability-lookup.orgcm0002@lemmings.world · 10 days agomessage-square0linkfedilink
cm0002@toast.ooo · 13 days agoSupply chain attack hits 300 million-download Axios npm packagewww.itnews.com.auexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkSupply chain attack hits 300 million-download Axios npm packagewww.itnews.com.aucm0002@toast.ooo · 13 days agomessage-square0linkfedilink
cm0002@toast.ooo · 13 days agoVulnerability Research Is Cooked — Quarrelsomeplus-squaresockpuppet.orgexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkVulnerability Research Is Cooked — Quarrelsomeplus-squaresockpuppet.orgcm0002@toast.ooo · 13 days agomessage-square1linkfedilink
shellsharks@infosec.pubM · 14 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 14 days agomessage-square0linkfedilink
Innerworld@lemmy.world · 15 days agoShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comInnerworld@lemmy.world · 15 days agomessage-square0linkfedilink