Cedric@lemmy.mlEnglish · edit-22 days agoA Python client for the Global CVE Allocation System.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkA Python client for the Global CVE Allocation System.plus-squaregithub.comCedric@lemmy.mlEnglish · edit-22 days agomessage-square0fedilink
HiddenLayer555@lemmy.mlEnglish · edit-213 days agoVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationwww.youtube.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationwww.youtube.comHiddenLayer555@lemmy.mlEnglish · edit-213 days agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 13 days agoGCVE: Global CVE Allocation Systemplus-squaregcve.euexternal-linkmessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkGCVE: Global CVE Allocation Systemplus-squaregcve.euCedric@lemmy.mlEnglish · 13 days agomessage-square1fedilink
Arthur Besse@lemmy.mlEnglish · 14 days agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up136arrow-down12
arrow-up134arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comArthur Besse@lemmy.mlEnglish · 14 days agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 21 days agoGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 21 days agomessage-square0fedilink
Zerush@lemmy.ml · 22 days agoHacker hacked hackersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHacker hacked hackersplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 22 days agomessage-square0fedilink
maltfield@lemmy.ml · 24 days agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square7fedilinkarrow-up110arrow-down16
arrow-up14arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@lemmy.ml · 24 days agomessage-square7fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.euexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.eu☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coexternal-linkmessage-square0fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
BusKill · 2 months agoTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inBusKill · 2 months agomessage-square0fedilink
Cedric@lemmy.ml · 2 months agoLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgCedric@lemmy.ml · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 2 months agotwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linktwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comArthur Besse@lemmy.mlEnglish · 2 months agomessage-square0fedilink
Cedric@lemmy.mlEnglish · 2 months agoVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 2 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink
Zerush@lemmy.ml · 3 months agoMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 3 months agomessage-square1fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoVSCode’s SSH Agent Is Bananasplus-squarefly.ioexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkVSCode’s SSH Agent Is Bananasplus-squarefly.io☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink
davel [he/him]@lemmy.mlEnglish · 3 months agoViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comexternal-linkmessage-square1fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comdavel [he/him]@lemmy.mlEnglish · 3 months agomessage-square1fedilink
Cedric@lemmy.mlEnglish · 3 months agoTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 3 months agomessage-square0fedilink