Cat@ponder.cat to cybersecurity@infosec.pub · edit-21 month ago[Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.plus-squareopenai.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-link[Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.plus-squareopenai.comCat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agomessage-square0fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agoDeceptiveDevelopment targets freelance developers.plus-squarewww.welivesecurity.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkDeceptiveDevelopment targets freelance developers.plus-squarewww.welivesecurity.comCat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agomessage-square0fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agoNew wave of targeted attacks of the Angry Likho APT on Russian organizations.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkNew wave of targeted attacks of the Angry Likho APT on Russian organizations.plus-squaresecurelist.comCat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agomessage-square0fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · 1 month agoWeathering the storm: In the midst of a Typhoon.plus-squareblog.talosintelligence.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkWeathering the storm: In the midst of a Typhoon.plus-squareblog.talosintelligence.comCat@ponder.cat to cybersecurity@infosec.pub · 1 month agomessage-square1fedilink
Cat@ponder.cat to Open Source@lemmy.mlEnglish · 1 month agoAmazon Kindle eBook Bulk Downloader: for downloading your Kindle eBooks in a more automated way than is typically permitted, this tool can create backup copies of the books you've already purchased.plus-squaregithub.comexternal-linkmessage-square27fedilinkarrow-up1293arrow-down12
arrow-up1291arrow-down1external-linkAmazon Kindle eBook Bulk Downloader: for downloading your Kindle eBooks in a more automated way than is typically permitted, this tool can create backup copies of the books you've already purchased.plus-squaregithub.comCat@ponder.cat to Open Source@lemmy.mlEnglish · 1 month agomessage-square27fedilink
Cat@ponder.cat to Free and Open Source Software@beehaw.orgEnglish · 1 month agoAmazon Kindle eBook Bulk Downloader: for downloading your Kindle eBooks in a more automated way than is typically permitted, this tool can create backup copies of the books you've already purchased.plus-squaregithub.comexternal-linkmessage-square5fedilinkarrow-up1116arrow-down10
arrow-up1116arrow-down1external-linkAmazon Kindle eBook Bulk Downloader: for downloading your Kindle eBooks in a more automated way than is typically permitted, this tool can create backup copies of the books you've already purchased.plus-squaregithub.comCat@ponder.cat to Free and Open Source Software@beehaw.orgEnglish · 1 month agomessage-square5fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agoGhost (Cring) Ransomware.plus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGhost (Cring) Ransomware.plus-squarewww.cisa.govCat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agomessage-square0fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agoSignals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger.plus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkSignals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger.plus-squarecloud.google.comCat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agomessage-square0fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agoHow Phished Data Turns into Apple & Google Wallets.plus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHow Phished Data Turns into Apple & Google Wallets.plus-squarekrebsonsecurity.comCat@ponder.cat to cybersecurity@infosec.pub · edit-21 month agomessage-square0fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · 2 months agoStaryDobry campaign targets gamers with XMRig miner.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkStaryDobry campaign targets gamers with XMRig miner.plus-squaresecurelist.comCat@ponder.cat to cybersecurity@infosec.pub · 2 months agomessage-square0fedilink
Cat@ponder.cat to Free and Open Source Software@beehaw.orgEnglish · edit-22 months agoWikiTimeline: Transform Wikipedia articles into interactive timelines where you can compare historical figures/events and discover surprising connections.plus-squarewiki-timeline.comexternal-linkmessage-square4fedilinkarrow-up164arrow-down10
arrow-up164arrow-down1external-linkWikiTimeline: Transform Wikipedia articles into interactive timelines where you can compare historical figures/events and discover surprising connections.plus-squarewiki-timeline.comCat@ponder.cat to Free and Open Source Software@beehaw.orgEnglish · edit-22 months agomessage-square4fedilink
Cat@ponder.cat to Open Source@lemmy.mlEnglish · edit-22 months agoWikiTimeline: Transform Wikipedia articles into interactive timelines where you can compare historical figures/events and discover surprising connections.plus-squarewiki-timeline.comexternal-linkmessage-square6fedilinkarrow-up198arrow-down15
arrow-up193arrow-down1external-linkWikiTimeline: Transform Wikipedia articles into interactive timelines where you can compare historical figures/events and discover surprising connections.plus-squarewiki-timeline.comCat@ponder.cat to Open Source@lemmy.mlEnglish · edit-22 months agomessage-square6fedilink
Cat@ponder.cat to Open Source@lemmy.mlEnglish · 2 months agoScira: Opensource alternative for Perplexity search engine.plus-squarescira.appexternal-linkmessage-square3fedilinkarrow-up163arrow-down18
arrow-up155arrow-down1external-linkScira: Opensource alternative for Perplexity search engine.plus-squarescira.appCat@ponder.cat to Open Source@lemmy.mlEnglish · 2 months agomessage-square3fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · 2 months agoThe BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.plus-squarewww.microsoft.comCat@ponder.cat to cybersecurity@infosec.pub · 2 months agomessage-square0fedilink
Cat@ponder.cat to Technology@beehaw.orgEnglish · 2 months agoReddit Blames Google Algorithm Changes For Not Hitting User Growth.www.seroundtable.comexternal-linkmessage-square18fedilinkarrow-up168arrow-down10
arrow-up168arrow-down1external-linkReddit Blames Google Algorithm Changes For Not Hitting User Growth.www.seroundtable.comCat@ponder.cat to Technology@beehaw.orgEnglish · 2 months agomessage-square18fedilink
Cat@ponder.cat to Technology@beehaw.orgEnglish · 2 months agoChinese apps face scrutiny in US but users keep scrolling.plus-squarewww.voanews.comexternal-linkmessage-square3fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkChinese apps face scrutiny in US but users keep scrolling.plus-squarewww.voanews.comCat@ponder.cat to Technology@beehaw.orgEnglish · 2 months agomessage-square3fedilink
Cat@ponder.cat to Technology@beehaw.orgEnglish · edit-22 months agoTired of spotty internet, Bolivians are smuggling in Starlink.plus-squarerestofworld.orgexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkTired of spotty internet, Bolivians are smuggling in Starlink.plus-squarerestofworld.orgCat@ponder.cat to Technology@beehaw.orgEnglish · edit-22 months agomessage-square0fedilink
Cat@ponder.cat to Technology@beehaw.orgEnglish · 2 months agoDating App Cover-Up: How Tinder, Hinge, and Their Corporate Owner Keep Rape Under Wraps.plus-squarethemarkup.orgexternal-linkmessage-square8fedilinkarrow-up196arrow-down10
arrow-up196arrow-down1external-linkDating App Cover-Up: How Tinder, Hinge, and Their Corporate Owner Keep Rape Under Wraps.plus-squarethemarkup.orgCat@ponder.cat to Technology@beehaw.orgEnglish · 2 months agomessage-square8fedilink
Cat@ponder.cat to cybersecurity@infosec.pub · 2 months agoCISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.plus-squarewww.cisa.govexternal-linkmessage-square2fedilinkarrow-up115arrow-down12
arrow-up113arrow-down1external-linkCISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.plus-squarewww.cisa.govCat@ponder.cat to cybersecurity@infosec.pub · 2 months agomessage-square2fedilink
Cat@ponder.cat to Open Source@lemmy.mlEnglish · 2 months agoChronolink: A tool for bypassing time-based features of Family Link parental controls.plus-squaregithub.comexternal-linkmessage-square4fedilinkarrow-up124arrow-down12
arrow-up122arrow-down1external-linkChronolink: A tool for bypassing time-based features of Family Link parental controls.plus-squaregithub.comCat@ponder.cat to Open Source@lemmy.mlEnglish · 2 months agomessage-square4fedilink
minus-squareCat@ponder.catOPtoOpen Source@lemmy.ml•Nagram X: A variant of Nagram[Telegram client] with additional(ToS breaking) features.linkfedilinkEnglisharrow-up1arrow-down1·2 months agoDo you know what does Tos mean? linkfedilink
Do you know what does Tos mean?