cm0002@europe.pub · 1 hour agoMeta is earning a fortune on a deluge of fraudulent ads, documents showplus-squarewww.reuters.comexternal-linkmessage-square1linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkMeta is earning a fortune on a deluge of fraudulent ads, documents showplus-squarewww.reuters.comcm0002@europe.pub · 1 hour agomessage-square1linkfedilink
randomname@scribe.disroot.org · 12 hours agoCybersecurity: Russian attacks surge in Ukraine and Europe, Chinese groups target Latin American governments, report saysplus-squarewww.eset.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkCybersecurity: Russian attacks surge in Ukraine and Europe, Chinese groups target Latin American governments, report saysplus-squarewww.eset.comrandomname@scribe.disroot.org · 12 hours agomessage-square0linkfedilink
floofloof@lemmy.ca · 2 days agoThe Great Firewall: Massive data leak reveals the inner workings of China's censorship regimeplus-squaredti.domaintools.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkThe Great Firewall: Massive data leak reveals the inner workings of China's censorship regimeplus-squaredti.domaintools.comfloofloof@lemmy.ca · 2 days agomessage-square0linkfedilink
floofloof@lemmy.ca · 3 days agoThe limits of zero-knowledge for age-verification | Braveplus-squarebrave.comexternal-linkmessage-square3linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkThe limits of zero-knowledge for age-verification | Braveplus-squarebrave.comfloofloof@lemmy.ca · 3 days agomessage-square3linkfedilink
cm0002@infosec.pub · 7 days agoStudy concludes cybersecurity training doesn’t workplus-squarewww.kpbs.orgexternal-linkmessage-square49linkfedilinkarrow-up1180arrow-down15
arrow-up1175arrow-down1external-linkStudy concludes cybersecurity training doesn’t workplus-squarewww.kpbs.orgcm0002@infosec.pub · 7 days agomessage-square49linkfedilink
shellsharks@infosec.pubM · 3 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 3 days agomessage-square1linkfedilink
Hotznplotzn@lemmy.sdf.org · 6 days agoChina-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomatsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkChina-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomatsplus-squarethehackernews.comHotznplotzn@lemmy.sdf.org · 6 days agomessage-square0linkfedilink
Michael Altfield@lemmy.vg · 4 days agoHow to check if Tor Onion Service is alive?plus-squaremessage-squaremessage-square1linkfedilinkarrow-up15arrow-down13
arrow-up12arrow-down1message-squareHow to check if Tor Onion Service is alive?plus-squareMichael Altfield@lemmy.vg · 4 days agomessage-square1linkfedilink
xoron@programming.dev · edit-23 days agoI wanted the Signal protocol implementation in javascript, but couldnt find one suitable... so i tried to create it myself.plus-squareprogramming.devimagemessage-square2linkfedilinkarrow-up16arrow-down17
arrow-up1-1arrow-down1imageI wanted the Signal protocol implementation in javascript, but couldnt find one suitable... so i tried to create it myself.plus-squareprogramming.devxoron@programming.dev · edit-23 days agomessage-square2linkfedilink
PhilipTheBucket@quokk.auEnglish · 8 days agoRussia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devsplus-squarego.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkRussia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devsplus-squarego.theregister.comPhilipTheBucket@quokk.auEnglish · 8 days agomessage-square0linkfedilink
cm0002@infosec.pub · 8 days agoNPM flooded with malicious packages downloaded more than 86,000 timesplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkNPM flooded with malicious packages downloaded more than 86,000 timesplus-squarearstechnica.comcm0002@infosec.pub · 8 days agomessage-square0linkfedilink
cm0002@lemmings.world · 9 days agoSomeone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Detailsplus-squarewww.404media.coexternal-linkmessage-square3linkfedilinkarrow-up131arrow-down12
arrow-up129arrow-down1external-linkSomeone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Detailsplus-squarewww.404media.cocm0002@lemmings.world · 9 days agomessage-square3linkfedilink
cm0002@lemmy.zip · 10 days agoMaking A Virtual Machine Look Like Real Hardware To Malware | Hackadayplus-squarehackaday.comexternal-linkmessage-square2linkfedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkMaking A Virtual Machine Look Like Real Hardware To Malware | Hackadayplus-squarehackaday.comcm0002@lemmy.zip · 10 days agomessage-square2linkfedilink
shellsharks@infosec.pubM · 10 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 10 days agomessage-square2linkfedilink
Iced Raktajino@startrek.website · 11 days agoMaking A Virtual Machine Look Like Real Hardware To Malwareplus-squarehackaday.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkMaking A Virtual Machine Look Like Real Hardware To Malwareplus-squarehackaday.comIced Raktajino@startrek.website · 11 days agomessage-square0linkfedilink
xoron@programming.dev · 11 days agoMulti-Protocol Cascading Round-Robin Cipherplus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMulti-Protocol Cascading Round-Robin Cipherplus-squarexoron@programming.dev · 11 days agomessage-square0linkfedilink
cm0002@lemmings.world · 12 days agoGmail Passwords Confirmed As Part Of 183 Million Account Data Leakplus-squarewww.forbes.comexternal-linkmessage-square7linkfedilinkarrow-up193arrow-down13
arrow-up190arrow-down1external-linkGmail Passwords Confirmed As Part Of 183 Million Account Data Leakplus-squarewww.forbes.comcm0002@lemmings.world · 12 days agomessage-square7linkfedilink
cm0002@lemmings.world · 14 days agoOne wrong letter: UN moves to curb cybercrime with new convention | UN Newsplus-squarenews.un.orgexternal-linkmessage-square1linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkOne wrong letter: UN moves to curb cybercrime with new convention | UN Newsplus-squarenews.un.orgcm0002@lemmings.world · 14 days agomessage-square1linkfedilink
Deebster@infosec.pub · edit-216 days agoTIL that PortSwigger is a jokeplus-squaremessage-squaremessage-square2linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1message-squareTIL that PortSwigger is a jokeplus-squareDeebster@infosec.pub · edit-216 days agomessage-square2linkfedilink
Otter Raft@lemmy.ca · 16 days agoCache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkCache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technicaplus-squarearstechnica.comOtter Raft@lemmy.ca · 16 days agomessage-square0linkfedilink