Cedric@lemmy.mlEnglish · edit-23 days agoA Python client for the Global CVE Allocation System.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkA Python client for the Global CVE Allocation System.plus-squaregithub.comCedric@lemmy.mlEnglish · edit-23 days agomessage-square0linkfedilink
HiddenLayer555@lemmy.mlEnglish · edit-214 days agoVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comHiddenLayer555@lemmy.mlEnglish · edit-214 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 14 days agoGCVE: Global CVE Allocation Systemplus-squaregcve.euexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkGCVE: Global CVE Allocation Systemplus-squaregcve.euCedric@lemmy.mlEnglish · 14 days agomessage-square1linkfedilink
Arthur Besse@lemmy.mlEnglish · 15 days agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up136arrow-down12
arrow-up134arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comArthur Besse@lemmy.mlEnglish · 15 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agoGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 23 days agoHacker hacked hackersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHacker hacked hackersplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 23 days agomessage-square0linkfedilink
maltfield@lemmy.ml · 25 days agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square7linkfedilinkarrow-up110arrow-down16
arrow-up14arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@lemmy.ml · 25 days agomessage-square7linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.euexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.eu☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 2 months agoRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coCedric@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
Cedric@lemmy.ml · 2 months agoLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgCedric@lemmy.ml · 2 months agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · 2 months agotwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linktwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comArthur Besse@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 3 months agoVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
Zerush@lemmy.ml · 3 months agoMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 3 months agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoVSCode’s SSH Agent Is Bananasplus-squarefly.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVSCode’s SSH Agent Is Bananasplus-squarefly.io☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
davel [he/him]@lemmy.mlEnglish · 3 months agoViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comdavel [he/him]@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 3 months agoTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrack vulnerabilities with product watch lists and email notificationsplus-squarevulnerability.circl.luCedric@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · edit-23 months agoAMD Zen 1 through Zen 4 CPUs use an insecure hash function in the signature validation for microcode updates; researchers released a proof of concept update which makes the RDRAND instruction return 4plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAMD Zen 1 through Zen 4 CPUs use an insecure hash function in the signature validation for microcode updates; researchers released a proof of concept update which makes the RDRAND instruction return 4plus-squaregithub.comArthur Besse@lemmy.mlEnglish · edit-23 months agomessage-square0linkfedilink