rakibhakas@lemmy.world · 2 months ago🔍 Unlock the Power of OSINT with Expert Investigation Services 🕵️♂️plus-squarelemmy.worldimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1image🔍 Unlock the Power of OSINT with Expert Investigation Services 🕵️♂️plus-squarelemmy.worldrakibhakas@lemmy.world · 2 months agomessage-square0fedilink
positive_intentions@lemmy.mlEnglish · edit-22 months agoRoast the security of my appplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareRoast the security of my appplus-squarepositive_intentions@lemmy.mlEnglish · edit-22 months agomessage-square0fedilink
fubarx@lemmy.ml · edit-23 months agoWatch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokesplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWatch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokesplus-squarewww.wired.comfubarx@lemmy.ml · edit-23 months agomessage-square0fedilink
h0bbl3s@lemmy.world · 3 months agoVulnerability scanning with vulsplus-squareh0bbl3s.port0.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability scanning with vulsplus-squareh0bbl3s.port0.orgh0bbl3s@lemmy.world · 3 months agomessage-square0fedilink
Cedric@lemmy.ml · 3 months agoRelease 1.3.0 of Vulnerability Lookup with many improvementsplus-squarelemmy.mlimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageRelease 1.3.0 of Vulnerability Lookup with many improvementsplus-squarelemmy.mlCedric@lemmy.ml · 3 months agomessage-square0fedilink
Cedric@lemmy.ml · 4 months agoVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comCedric@lemmy.ml · 4 months agomessage-square0fedilink
kryllic@programming.dev · 4 months agoCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comkryllic@programming.dev · 4 months agomessage-square0fedilink
badelf@lemmy.ml · 5 months agoPayPal Is Planning an Ad Business Using Data on Its Millions of Shoppersplus-squarewww.wsj.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPayPal Is Planning an Ad Business Using Data on Its Millions of Shoppersplus-squarewww.wsj.combadelf@lemmy.ml · 5 months agomessage-square1fedilink
ylai@lemmy.mlEnglish · 8 months agoJetBrains TeamCity under attack by ransomware thugs after disclosure messplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJetBrains TeamCity under attack by ransomware thugs after disclosure messplus-squarewww.theregister.comylai@lemmy.mlEnglish · 8 months agomessage-square0fedilink
𝘋𝘪𝘳𝘬@lemmy.mlEnglish · 8 months agoWas there a recent hack/leak affecting Spotify?plus-squaremessage-squaremessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWas there a recent hack/leak affecting Spotify?plus-square𝘋𝘪𝘳𝘬@lemmy.mlEnglish · 8 months agomessage-square1fedilink
birdcat@lemmy.ml · 9 months agoemail TLS questionplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareemail TLS questionplus-squarebirdcat@lemmy.ml · 9 months agomessage-square0fedilink
What's Delicious?@lemmy.ml · 9 months agoSeeking Advice on Cyber Security Job Posts in Europe from outside the EUplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareSeeking Advice on Cyber Security Job Posts in Europe from outside the EUplus-squareWhat's Delicious?@lemmy.ml · 9 months agomessage-square0fedilink
mheld@infosec.pubEnglish · edit-210 months agoThe Most Significant AI-related Risks in 2024plus-squareinfosec.pubimagemessage-square2fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1imageThe Most Significant AI-related Risks in 2024plus-squareinfosec.pubmheld@infosec.pubEnglish · edit-210 months agomessage-square2fedilink
chobeat@lemmy.mlEnglish · 10 months agoMobile reverse engineering to empower the gig economy workers and labor unionsplus-squaremedia.ccc.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMobile reverse engineering to empower the gig economy workers and labor unionsplus-squaremedia.ccc.dechobeat@lemmy.mlEnglish · 10 months agomessage-square0fedilink
MOMA_Trance@slrpnk.net · 10 months ago2024 Weaponized AI Arms Race: Impacts and Ethical Stakesplus-squarewww.ultra-unlimited.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-link2024 Weaponized AI Arms Race: Impacts and Ethical Stakesplus-squarewww.ultra-unlimited.comMOMA_Trance@slrpnk.net · 10 months agomessage-square0fedilink
krigo666@lemmy.world · 11 months agoJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackplus-squarearstechnica.comkrigo666@lemmy.world · 11 months agomessage-square0fedilink
kixik@lemmy.ml · 1 year agoMozilla patches Firefox, Thunderbird against zero-day exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMozilla patches Firefox, Thunderbird against zero-day exploited in attacksplus-squarewww.bleepingcomputer.comkixik@lemmy.ml · 1 year agomessage-square0fedilink
Jimmycrackcrack@lemmy.ml · edit-21 year agoto what extent does obscurity mitigate risk?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareto what extent does obscurity mitigate risk?plus-squareJimmycrackcrack@lemmy.ml · edit-21 year agomessage-square0fedilink
zHenta7@lemmy.mlEnglish · edit-21 year agoHOW DO I GET INTO CYBERSECURITY?plus-squaremessage-squaremessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHOW DO I GET INTO CYBERSECURITY?plus-squarezHenta7@lemmy.mlEnglish · edit-21 year agomessage-square1fedilink
Sparkega@lemmy.worldEnglish · 1 year agoHacker Archetypes - D&D Classesplus-squarewww.gosecure.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacker Archetypes - D&D Classesplus-squarewww.gosecure.netSparkega@lemmy.worldEnglish · 1 year agomessage-square0fedilink