cm0002@lemmings.world · 1 day agoCNVD Severity Classification and RMSV Effects: Honest Metrics & Data Leakageplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCNVD Severity Classification and RMSV Effects: Honest Metrics & Data Leakageplus-squarewww.vulnerability-lookup.orgcm0002@lemmings.world · 1 day agomessage-square0fedilink
cm0002@toast.ooo · 4 days agoSupply chain attack hits 300 million-download Axios npm packagewww.itnews.com.auexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkSupply chain attack hits 300 million-download Axios npm packagewww.itnews.com.aucm0002@toast.ooo · 4 days agomessage-square0fedilink
cm0002@toast.ooo · 4 days agoVulnerability Research Is Cooked — Quarrelsomeplus-squaresockpuppet.orgexternal-linkmessage-square1fedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkVulnerability Research Is Cooked — Quarrelsomeplus-squaresockpuppet.orgcm0002@toast.ooo · 4 days agomessage-square1fedilink
shellsharks@infosec.pubM · 5 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 5 days agomessage-square0fedilink
Innerworld@lemmy.world · 7 days agoShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comInnerworld@lemmy.world · 7 days agomessage-square0fedilink
Innerworld@lemmy.world · 8 days agoHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comInnerworld@lemmy.world · 8 days agomessage-square0fedilink
Innerworld@lemmy.world · 8 days agoIranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comexternal-linkmessage-square1fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkIranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comInnerworld@lemmy.world · 8 days agomessage-square1fedilink
cm0002@europe.pub · edit-28 days agoThe telnyx packages on PyPI have been compromisedplus-squarelwn.netexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkThe telnyx packages on PyPI have been compromisedplus-squarelwn.netcm0002@europe.pub · edit-28 days agomessage-square0fedilink
Innerworld@lemmy.world · 8 days agoHackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppersplus-squaresan.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppersplus-squaresan.comInnerworld@lemmy.world · 8 days agomessage-square0fedilink
shellsharks@infosec.pubM · 9 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 9 days agomessage-square0fedilink
Amoxtli@thelemmy.club · 9 days agoIran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacksplus-squarecircleid.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkIran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacksplus-squarecircleid.comAmoxtli@thelemmy.club · 9 days agomessage-square0fedilink
cm0002@europe.pub · 9 days agoGoogle bumps up Q Day deadline to 2029, far sooner than previously thoughtplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkGoogle bumps up Q Day deadline to 2029, far sooner than previously thoughtplus-squarearstechnica.comcm0002@europe.pub · 9 days agomessage-square0fedilink
Innerworld@lemmy.world · 10 days agoThousands of websites are accidentally broadcasting sensitive dataplus-squaretechxplore.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkThousands of websites are accidentally broadcasting sensitive dataplus-squaretechxplore.comInnerworld@lemmy.world · 10 days agomessage-square1fedilink
shellsharks@infosec.pubM · 10 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 10 days agomessage-square0fedilink
cm0002@literature.cafe · 10 days agoVulnMCP 1.0.0 releasedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnMCP 1.0.0 releasedplus-squarewww.vulnerability-lookup.orgcm0002@literature.cafe · 10 days agomessage-square0fedilink
cm0002@literature.cafe · 11 days agoSupply Chain Attack in litellm 1.82.8 on PyPIplus-squarefuturesearch.aiexternal-linkmessage-square1fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkSupply Chain Attack in litellm 1.82.8 on PyPIplus-squarefuturesearch.aicm0002@literature.cafe · 11 days agomessage-square1fedilink
Kissaki@programming.dev · 11 days agoDelve - Fake Compliance as a Serviceplus-squaredeepdelver.substack.comexternal-linkmessage-square2fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkDelve - Fake Compliance as a Serviceplus-squaredeepdelver.substack.comKissaki@programming.dev · 11 days agomessage-square2fedilink
Innerworld@lemmy.world · 12 days agoUS State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversariesplus-squareabcnews.comexternal-linkmessage-square3fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkUS State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversariesplus-squareabcnews.comInnerworld@lemmy.world · 12 days agomessage-square3fedilink
cm0002@literature.cafe · 12 days agoSomeone has publicly leaked an exploit kit that can hack millions of iPhonesplus-squaretechcrunch.comexternal-linkmessage-square13fedilinkarrow-up199arrow-down12
arrow-up197arrow-down1external-linkSomeone has publicly leaked an exploit kit that can hack millions of iPhonesplus-squaretechcrunch.comcm0002@literature.cafe · 12 days agomessage-square13fedilink
cm0002@literature.cafe · 12 days agoTrivy Compromised by "TeamPCP" | Wiz Blogplus-squarewww.wiz.ioexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkTrivy Compromised by "TeamPCP" | Wiz Blogplus-squarewww.wiz.iocm0002@literature.cafe · 12 days agomessage-square0fedilink