☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agoHackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Secondsplus-squarewww.wired.comexternal-linkmessage-square1fedilinkarrow-up19
arrow-up19external-linkHackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Secondsplus-squarewww.wired.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agoMSS unveils case of foreign agents hacking commercial camera to spy on Chinese portplus-squarewww.globaltimes.cnexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkMSS unveils case of foreign agents hacking commercial camera to spy on Chinese portplus-squarewww.globaltimes.cn☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 day agomessage-square0fedilink
Zerush@lemmy.ml · 5 days agoReVault! When your SoC turns against you…plus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkReVault! When your SoC turns against you…plus-squareblog.talosintelligence.comZerush@lemmy.ml · 5 days agomessage-square0fedilink
Cedric@lemmy.mlEnglish · edit-212 days agoVulnerability-Lookup 2.14.0 releasedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkVulnerability-Lookup 2.14.0 releasedplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · edit-212 days agomessage-square0fedilink
adbenitez@lemmy.ml · edit-217 days agoArcaneChat 2.6.0 released with major security enhancementplus-squaremessage-squaremessage-square0fedilinkarrow-up13
arrow-up13message-squareArcaneChat 2.6.0 released with major security enhancementplus-squareadbenitez@lemmy.ml · edit-217 days agomessage-square0fedilink
Zerush@lemmy.ml · 17 days agoAI-Generated Malware in Panda Image Hides Persistent Linux Threatplus-squarewww.aquasec.comexternal-linkmessage-square2fedilinkarrow-up119
arrow-up119external-linkAI-Generated Malware in Panda Image Hides Persistent Linux Threatplus-squarewww.aquasec.comZerush@lemmy.ml · 17 days agomessage-square2fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 17 days agoHacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agentplus-squarewww.404media.coexternal-linkmessage-square1fedilinkarrow-up120
arrow-up120external-linkHacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agentplus-squarewww.404media.co☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 17 days agomessage-square1fedilink
Zerush@lemmy.ml · 19 days ago‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old companyplus-squarewww.hindustantimes.comexternal-linkmessage-square6fedilinkarrow-up15
arrow-up15external-link‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old companyplus-squarewww.hindustantimes.comZerush@lemmy.ml · 19 days agomessage-square6fedilink
goatbeard@beehaw.org · 20 days agoLimitations of GrapheneOSplus-squaremessage-squaremessage-square4fedilinkarrow-up16
arrow-up16message-squareLimitations of GrapheneOSplus-squaregoatbeard@beehaw.org · 20 days agomessage-square4fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 25 days agoThe Solidity Language open-source package was used in a $500,000 crypto heistplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkThe Solidity Language open-source package was used in a $500,000 crypto heistplus-squaresecurelist.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 25 days agomessage-square0fedilink
Zerush@lemmy.ml · 25 days agoMalware in DNS - DomainTools Investigations | DTIplus-squaredti.domaintools.comexternal-linkmessage-square0fedilinkarrow-up17
arrow-up17external-linkMalware in DNS - DomainTools Investigations | DTIplus-squaredti.domaintools.comZerush@lemmy.ml · 25 days agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 25 days agoVLAI Hugging Face Setplus-squarediscourse.ossbase.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkVLAI Hugging Face Setplus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 25 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 28 days agoHow to Prove False Statements: Practical Attacks on Fiat-Shamireprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHow to Prove False Statements: Practical Attacks on Fiat-Shamireprint.iacr.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 28 days agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability-Lookup 2.13.0plus-squarediscourse.ossbase.orgexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkVulnerability-Lookup 2.13.0plus-squarediscourse.ossbase.orgCedric@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Zerush@lemmy.ml · 1 month agoChatGPT creates phisher’s paradise by serving wrong URLsplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up118
arrow-up118external-linkChatGPT creates phisher’s paradise by serving wrong URLsplus-squarewww.theregister.comZerush@lemmy.ml · 1 month agomessage-square1fedilink
Zerush@lemmy.ml · edit-21 month agoAct now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blogplus-squaretechcommunity.microsoft.comexternal-linkmessage-square0fedilinkarrow-up16
arrow-up16external-linkAct now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blogplus-squaretechcommunity.microsoft.comZerush@lemmy.ml · edit-21 month agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 1 month agoVLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classificationplus-squarehuggingface.coexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkVLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classificationplus-squarehuggingface.coCedric@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability Report - June 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkVulnerability Report - June 2025plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 1 month agoAI Model for Chinese Vulnerability Severity in Vulnerability-Lookupplus-squarewww.linkedin.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkAI Model for Chinese Vulnerability Severity in Vulnerability-Lookupplus-squarewww.linkedin.comCedric@lemmy.mlEnglish · 1 month agomessage-square0fedilink
Zerush@lemmy.ml · edit-21 month agoThe Most Terrifying Company in America Is Probably One You’ve Never Heard Ofplus-squarewww.thedailybeast.comexternal-linkmessage-square9fedilinkarrow-up190
arrow-up190external-linkThe Most Terrifying Company in America Is Probably One You’ve Never Heard Ofplus-squarewww.thedailybeast.comZerush@lemmy.ml · edit-21 month agomessage-square9fedilink