shellsharks@infosec.pubM · 10 hours agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 10 hours agomessage-square1linkfedilink
cm0002@lemmy.world · 3 days agoNvidia RTX 5090 can crack an 8-digit passcode in just 3 hours — password cracking benchmarks show tremendous performanceplus-squarewww.tomshardware.comexternal-linkmessage-square9linkfedilinkarrow-up153arrow-down11
arrow-up152arrow-down1external-linkNvidia RTX 5090 can crack an 8-digit passcode in just 3 hours — password cracking benchmarks show tremendous performanceplus-squarewww.tomshardware.comcm0002@lemmy.world · 3 days agomessage-square9linkfedilink
cm0002@lemmy.world · 4 days agoDOGE software engineer’s computer infected by info-stealing malwareplus-squarearstechnica.comexternal-linkmessage-square13linkfedilinkarrow-up1238arrow-down12
arrow-up1236arrow-down1external-linkDOGE software engineer’s computer infected by info-stealing malwareplus-squarearstechnica.comcm0002@lemmy.world · 4 days agomessage-square13linkfedilink
cm0002@lemmy.world · 2 days agoTextbook and testing giant Pearson hit by cyberattack, customer data leakedplus-squarewww.techradar.comexternal-linkmessage-square2linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkTextbook and testing giant Pearson hit by cyberattack, customer data leakedplus-squarewww.techradar.comcm0002@lemmy.world · 2 days agomessage-square2linkfedilink
cm0002@lemmy.world · 4 days agoSupply chain attack hits npm package with 45,000 weekly downloadsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkSupply chain attack hits npm package with 45,000 weekly downloadsplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 4 days agomessage-square2linkfedilink
shellsharks@infosec.pubM · 4 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 4 days agomessage-square0linkfedilink
cm0002@lemmy.world · 4 days agoKickidler employee monitoring software abused in ransomware attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkKickidler employee monitoring software abused in ransomware attacksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 4 days agomessage-square0linkfedilink
randomname@scribe.disroot.org · 5 days agoUK under assault as number of ‘significant’ cyberattacks doubles: Foreign powers, ransomware gangs, AI threats drive surge in incidents affecting private businesses and government systemsplus-squarewww.thetimes.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkUK under assault as number of ‘significant’ cyberattacks doubles: Foreign powers, ransomware gangs, AI threats drive surge in incidents affecting private businesses and government systemsplus-squarewww.thetimes.comrandomname@scribe.disroot.org · 5 days agomessage-square0linkfedilink
Pro@programming.dev · 5 days agoBackdoor found in popular ecommerce componentsplus-squaresansec.ioexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkBackdoor found in popular ecommerce componentsplus-squaresansec.ioPro@programming.dev · 5 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 6 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 6 days agomessage-square1linkfedilink
randomname@scribe.disroot.org · 7 days agoChina has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weaponsplus-squarewww.taipeitimes.comexternal-linkmessage-square1linkfedilinkarrow-up118arrow-down13
arrow-up115arrow-down1external-linkChina has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weaponsplus-squarewww.taipeitimes.comrandomname@scribe.disroot.org · 7 days agomessage-square1linkfedilink
cm0002@lemmy.world · 4 days agoOperation PowerOFF Takes Down 9 DDoS Domainsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkOperation PowerOFF Takes Down 9 DDoS Domainsplus-squarewww.darkreading.comcm0002@lemmy.world · 4 days agomessage-square0linkfedilink
cm0002@lemmy.world · 6 days agoVulnerability-Lookup 2.9.0 - MITRE EMB3D, GCVEplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkVulnerability-Lookup 2.9.0 - MITRE EMB3D, GCVEplus-squarewww.vulnerability-lookup.orgcm0002@lemmy.world · 6 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 7 days agoItaly: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national securityplus-squaredecode39.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkItaly: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national securityplus-squaredecode39.comHotznplotzn@lemmy.sdf.org · 7 days agomessage-square0linkfedilink
CryptoLek@infosec.pub · 7 days agoBasic analysis of Kidflix users’ passwords – Kinda Blog by CryptoLekplus-squarecryptolek.infoexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkBasic analysis of Kidflix users’ passwords – Kinda Blog by CryptoLekplus-squarecryptolek.infoCryptoLek@infosec.pub · 7 days agomessage-square0linkfedilink
cm0002@lemmy.world · 7 days agoThreat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomwareplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThreat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomwareplus-squarecybersecuritynews.comcm0002@lemmy.world · 7 days agomessage-square0linkfedilink
Pro@programming.dev · 6 days agoReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkReturn of the Crypto Inferno Drainerplus-squareresearch.checkpoint.comPro@programming.dev · 6 days agomessage-square0linkfedilink
Pro@programming.dev · 7 days ago"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-link"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)isc.sans.eduPro@programming.dev · 7 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 8 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 8 days agomessage-square1linkfedilink
CryptoLek@infosec.pub · 8 days agoAll things infostealers. Week 18, 2025 – Kinda Blog by CryptoLekplus-squarecryptolek.infoexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAll things infostealers. Week 18, 2025 – Kinda Blog by CryptoLekplus-squarecryptolek.infoCryptoLek@infosec.pub · 8 days agomessage-square0linkfedilink