floofloof@lemmy.ca · 2 days agoThe Great Firewall: Massive data leak reveals the inner workings of China's censorship regimeplus-squaredti.domaintools.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkThe Great Firewall: Massive data leak reveals the inner workings of China's censorship regimeplus-squaredti.domaintools.comfloofloof@lemmy.ca · 2 days agomessage-square0linkfedilink
floofloof@lemmy.ca · 2 days agoThe limits of zero-knowledge for age-verification | Braveplus-squarebrave.comexternal-linkmessage-square3linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkThe limits of zero-knowledge for age-verification | Braveplus-squarebrave.comfloofloof@lemmy.ca · 2 days agomessage-square3linkfedilink
cm0002@infosec.pub · 6 days agoStudy concludes cybersecurity training doesn’t workplus-squarewww.kpbs.orgexternal-linkmessage-square49linkfedilinkarrow-up1174arrow-down15
arrow-up1169arrow-down1external-linkStudy concludes cybersecurity training doesn’t workplus-squarewww.kpbs.orgcm0002@infosec.pub · 6 days agomessage-square49linkfedilink
shellsharks@infosec.pubM · 3 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 3 days agomessage-square1linkfedilink
Hotznplotzn@lemmy.sdf.org · 5 days agoChina-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomatsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkChina-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomatsplus-squarethehackernews.comHotznplotzn@lemmy.sdf.org · 5 days agomessage-square0linkfedilink
Michael Altfield@lemmy.vg · 4 days agoHow to check if Tor Onion Service is alive?plus-squaremessage-squaremessage-square1linkfedilinkarrow-up14arrow-down13
arrow-up11arrow-down1message-squareHow to check if Tor Onion Service is alive?plus-squareMichael Altfield@lemmy.vg · 4 days agomessage-square1linkfedilink
xoron@programming.dev · edit-23 days agoI wanted the Signal protocol implementation in javascript, but couldnt find one suitable... so i tried to create it myself.plus-squareprogramming.devimagemessage-square2linkfedilinkarrow-up16arrow-down17
arrow-up1-1arrow-down1imageI wanted the Signal protocol implementation in javascript, but couldnt find one suitable... so i tried to create it myself.plus-squareprogramming.devxoron@programming.dev · edit-23 days agomessage-square2linkfedilink
PhilipTheBucket@quokk.auEnglish · 8 days agoRussia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devsplus-squarego.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkRussia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devsplus-squarego.theregister.comPhilipTheBucket@quokk.auEnglish · 8 days agomessage-square0linkfedilink
cm0002@infosec.pub · 8 days agoNPM flooded with malicious packages downloaded more than 86,000 timesplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkNPM flooded with malicious packages downloaded more than 86,000 timesplus-squarearstechnica.comcm0002@infosec.pub · 8 days agomessage-square0linkfedilink
cm0002@lemmings.world · 8 days agoSomeone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Detailsplus-squarewww.404media.coexternal-linkmessage-square3linkfedilinkarrow-up130arrow-down12
arrow-up128arrow-down1external-linkSomeone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Detailsplus-squarewww.404media.cocm0002@lemmings.world · 8 days agomessage-square3linkfedilink
cm0002@lemmy.zip · 9 days agoMaking A Virtual Machine Look Like Real Hardware To Malware | Hackadayplus-squarehackaday.comexternal-linkmessage-square2linkfedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkMaking A Virtual Machine Look Like Real Hardware To Malware | Hackadayplus-squarehackaday.comcm0002@lemmy.zip · 9 days agomessage-square2linkfedilink
shellsharks@infosec.pubM · 10 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up10arrow-down10
arrow-up10arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 10 days agomessage-square1linkfedilink
Iced Raktajino@startrek.website · 11 days agoMaking A Virtual Machine Look Like Real Hardware To Malwareplus-squarehackaday.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkMaking A Virtual Machine Look Like Real Hardware To Malwareplus-squarehackaday.comIced Raktajino@startrek.website · 11 days agomessage-square0linkfedilink
xoron@programming.dev · 11 days agoMulti-Protocol Cascading Round-Robin Cipherplus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMulti-Protocol Cascading Round-Robin Cipherplus-squarexoron@programming.dev · 11 days agomessage-square0linkfedilink
cm0002@lemmings.world · 11 days agoGmail Passwords Confirmed As Part Of 183 Million Account Data Leakplus-squarewww.forbes.comexternal-linkmessage-square7linkfedilinkarrow-up190arrow-down13
arrow-up187arrow-down1external-linkGmail Passwords Confirmed As Part Of 183 Million Account Data Leakplus-squarewww.forbes.comcm0002@lemmings.world · 11 days agomessage-square7linkfedilink
cm0002@lemmings.world · 13 days agoOne wrong letter: UN moves to curb cybercrime with new convention | UN Newsplus-squarenews.un.orgexternal-linkmessage-square1linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkOne wrong letter: UN moves to curb cybercrime with new convention | UN Newsplus-squarenews.un.orgcm0002@lemmings.world · 13 days agomessage-square1linkfedilink
Deebster@infosec.pub · edit-215 days agoTIL that PortSwigger is a jokeplus-squaremessage-squaremessage-square1linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1message-squareTIL that PortSwigger is a jokeplus-squareDeebster@infosec.pub · edit-215 days agomessage-square1linkfedilink
Otter Raft@lemmy.ca · 16 days agoCache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkCache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technicaplus-squarearstechnica.comOtter Raft@lemmy.ca · 16 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 18 days agoNotorious Chinese hacking group Salt Typhoon found lurking in European telecom networksplus-squarewww.techradar.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkNotorious Chinese hacking group Salt Typhoon found lurking in European telecom networksplus-squarewww.techradar.comHotznplotzn@lemmy.sdf.org · 18 days agomessage-square0linkfedilink
cm0002@lemmings.world · 18 days agoHow I Almost Got Hacked By A 'Job Interview'plus-squareblog.daviddodda.comexternal-linkmessage-square0linkfedilinkarrow-up130arrow-down12
arrow-up128arrow-down1external-linkHow I Almost Got Hacked By A 'Job Interview'plus-squareblog.daviddodda.comcm0002@lemmings.world · 18 days agomessage-square0linkfedilink