shellsharks@infosec.pubM · 7 hours agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 7 hours agomessage-square0linkfedilink
Penguin@lemmy.kde.social · edit-22 days agoEU's cybersecurity agency reports surge in cyberattacks against public administrations across Europeplus-squareindustrialcyber.coexternal-linkmessage-square1linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkEU's cybersecurity agency reports surge in cyberattacks against public administrations across Europeplus-squareindustrialcyber.coPenguin@lemmy.kde.social · edit-22 days agomessage-square1linkfedilink
randomname@scribe.disroot.org · 2 days agoEU Eyes Huawei and ZTE Ban in Mobile Networks of Member Countriesplus-squarewww.bloomberg.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkEU Eyes Huawei and ZTE Ban in Mobile Networks of Member Countriesplus-squarewww.bloomberg.comrandomname@scribe.disroot.org · 2 days agomessage-square0linkfedilink
Kissaki@programming.dev · 3 days agoToday I learned: binfmt_misc - dfir.ch - shadow suidplus-squaredfir.chexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkToday I learned: binfmt_misc - dfir.ch - shadow suidplus-squaredfir.chKissaki@programming.dev · 3 days agomessage-square0linkfedilink
cm0002@europe.pub · 4 days agoMeta is earning a fortune on a deluge of fraudulent ads, documents showplus-squarewww.reuters.comexternal-linkmessage-square3linkfedilinkarrow-up142arrow-down12
arrow-up140arrow-down1external-linkMeta is earning a fortune on a deluge of fraudulent ads, documents showplus-squarewww.reuters.comcm0002@europe.pub · 4 days agomessage-square3linkfedilink
randomname@scribe.disroot.org · 5 days agoCybersecurity: Russian attacks surge in Ukraine and Europe, Chinese groups target Latin American governments, report saysplus-squarewww.eset.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkCybersecurity: Russian attacks surge in Ukraine and Europe, Chinese groups target Latin American governments, report saysplus-squarewww.eset.comrandomname@scribe.disroot.org · 5 days agomessage-square0linkfedilink
floofloof@lemmy.ca · 6 days agoThe Great Firewall: Massive data leak reveals the inner workings of China's censorship regimeplus-squaredti.domaintools.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkThe Great Firewall: Massive data leak reveals the inner workings of China's censorship regimeplus-squaredti.domaintools.comfloofloof@lemmy.ca · 6 days agomessage-square0linkfedilink
floofloof@lemmy.ca · 7 days agoThe limits of zero-knowledge for age-verification | Braveplus-squarebrave.comexternal-linkmessage-square3linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkThe limits of zero-knowledge for age-verification | Braveplus-squarebrave.comfloofloof@lemmy.ca · 7 days agomessage-square3linkfedilink
shellsharks@infosec.pubM · 7 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 7 days agomessage-square1linkfedilink
xoron@programming.dev · edit-27 days agoI wanted the Signal protocol implementation in javascript, but couldnt find one suitable... so i tried to create it myself.plus-squareprogramming.devimagemessage-square2linkfedilinkarrow-up16arrow-down17
arrow-up1-1arrow-down1imageI wanted the Signal protocol implementation in javascript, but couldnt find one suitable... so i tried to create it myself.plus-squareprogramming.devxoron@programming.dev · edit-27 days agomessage-square2linkfedilink
Michael Altfield@lemmy.vg · 8 days agoHow to check if Tor Onion Service is alive?plus-squaremessage-squaremessage-square1linkfedilinkarrow-up15arrow-down13
arrow-up12arrow-down1message-squareHow to check if Tor Onion Service is alive?plus-squareMichael Altfield@lemmy.vg · 8 days agomessage-square1linkfedilink
Hotznplotzn@lemmy.sdf.org · 10 days agoChina-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomatsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkChina-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomatsplus-squarethehackernews.comHotznplotzn@lemmy.sdf.org · 10 days agomessage-square0linkfedilink
cm0002@infosec.pub · 11 days agoStudy concludes cybersecurity training doesn’t workplus-squarewww.kpbs.orgexternal-linkmessage-square48linkfedilinkarrow-up1180arrow-down15
arrow-up1175arrow-down1external-linkStudy concludes cybersecurity training doesn’t workplus-squarewww.kpbs.orgcm0002@infosec.pub · 11 days agomessage-square48linkfedilink
PhilipTheBucket@quokk.auEnglish · 12 days agoRussia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devsplus-squarego.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkRussia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devsplus-squarego.theregister.comPhilipTheBucket@quokk.auEnglish · 12 days agomessage-square0linkfedilink
cm0002@infosec.pub · 12 days agoNPM flooded with malicious packages downloaded more than 86,000 timesplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkNPM flooded with malicious packages downloaded more than 86,000 timesplus-squarearstechnica.comcm0002@infosec.pub · 12 days agomessage-square0linkfedilink
cm0002@lemmings.world · 13 days agoSomeone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Detailsplus-squarewww.404media.coexternal-linkmessage-square3linkfedilinkarrow-up131arrow-down12
arrow-up129arrow-down1external-linkSomeone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Detailsplus-squarewww.404media.cocm0002@lemmings.world · 13 days agomessage-square3linkfedilink
cm0002@lemmy.zip · 14 days agoMaking A Virtual Machine Look Like Real Hardware To Malware | Hackadayplus-squarehackaday.comexternal-linkmessage-square2linkfedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkMaking A Virtual Machine Look Like Real Hardware To Malware | Hackadayplus-squarehackaday.comcm0002@lemmy.zip · 14 days agomessage-square2linkfedilink
shellsharks@infosec.pubM · 14 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 14 days agomessage-square2linkfedilink
Iced Raktajino@startrek.website · 15 days agoMaking A Virtual Machine Look Like Real Hardware To Malwareplus-squarehackaday.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkMaking A Virtual Machine Look Like Real Hardware To Malwareplus-squarehackaday.comIced Raktajino@startrek.website · 15 days agomessage-square0linkfedilink
xoron@programming.dev · 15 days agoMulti-Protocol Cascading Round-Robin Cipherplus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMulti-Protocol Cascading Round-Robin Cipherplus-squarexoron@programming.dev · 15 days agomessage-square0linkfedilink