Cedric@lemmy.ml · 1 year agoVulnerability-Lookup 2.4.0plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVulnerability-Lookup 2.4.0plus-squarewww.vulnerability-lookup.orgCedric@lemmy.ml · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoStealing passwords and PINs entered by Apple Vision Pro usersplus-squarearxiv.orgexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkStealing passwords and PINs entered by Apple Vision Pro usersplus-squarearxiv.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 year agoDive into Historical Insights on Vulnerability Observations with Vulnerability-Lookupplus-squarelemmy.mlexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkDive into Historical Insights on Vulnerability Observations with Vulnerability-Lookupplus-squarelemmy.mlCedric@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 year agoA client to gather vulnerability-related information from Blueskyplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkA client to gather vulnerability-related information from Blueskyplus-squaregithub.comCedric@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 year agoThe Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tacticsplus-squarevulnerability.circl.luexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThe Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tacticsplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
atzanteol@sh.itjust.worksEnglish · 1 year agoShort-Lived Certificates Coming to Let’s Encryptplus-squareletsencrypt.orgexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkShort-Lived Certificates Coming to Let’s Encryptplus-squareletsencrypt.orgatzanteol@sh.itjust.worksEnglish · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkYearlong supply-chain attack targeting security pros steals 390K credentialsplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
birthdaycakebreadtea@lemmy.mlEnglish · 1 year agoDoes two-factor authentication with TOTP make sense in my case?plus-squaremessage-squaremessage-square3linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1message-squareDoes two-factor authentication with TOTP make sense in my case?plus-squarebirthdaycakebreadtea@lemmy.mlEnglish · 1 year agomessage-square3linkfedilink
Cedric@lemmy.mlEnglish · 1 year agoVulnerability-Lookup 2.2.0plus-squarelemmy.mlexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerability-Lookup 2.2.0plus-squarelemmy.mlCedric@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSpies hack Wi-Fi networks in far-off land to launch attack on target next doorplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoLeaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlockplus-squarewww.404media.coexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkLeaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlockplus-squarewww.404media.co☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoNew Glove infostealer malware bypasses Chrome’s cookie encryptionplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNew Glove infostealer malware bypasses Chrome’s cookie encryptionplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 year agoLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squaremessage-squaremessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1message-squareLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squareCedric@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square1linkfedilinkarrow-up15arrow-down13
arrow-up12arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square1linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoEuropean govt air-gapped systems breached using custom malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEuropean govt air-gapped systems breached using custom malwareplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · edit-21 year agoLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comArthur Besse@lemmy.mlEnglish · edit-21 year agomessage-square0linkfedilink
Cedric@lemmy.ml · 1 year agoVulnerability Lookup 1.5.0plus-squarelemmy.mlexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability Lookup 1.5.0plus-squarelemmy.mlCedric@lemmy.ml · 1 year agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · 1 year ago"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comArthur Besse@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoONNX Bot Tool Hijacks Microsoft 365 accounts & Even Bypass 2FAplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkONNX Bot Tool Hijacks Microsoft 365 accounts & Even Bypass 2FAplus-squarecybersecuritynews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agoiVerify found stock Google Pixel devices' app "showcase" With Excessive System Privileges, Including Remote Code Executionplus-squareiverify.ioexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkiVerify found stock Google Pixel devices' app "showcase" With Excessive System Privileges, Including Remote Code Executionplus-squareiverify.io☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 year agomessage-square1linkfedilink