Arthur Besse@lemmy.mlEnglish · edit-22 days agoCrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Rootwww.qualys.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkCrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Rootwww.qualys.comArthur Besse@lemmy.mlEnglish · edit-22 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 days agoSupply-chain attack using invisible code hits GitHub and other repositoriesplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkSupply-chain attack using invisible code hits GitHub and other repositoriesplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 3 days ago45,000 malicious IP addresses taken down in international cyber operationplus-squarewww.interpol.intexternal-linkmessage-square3linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link45,000 malicious IP addresses taken down in international cyber operationplus-squarewww.interpol.intZerush@lemmy.ml · 3 days agomessage-square3linkfedilink
Zerush@lemmy.ml · 5 days agoGitHub - Bombadil-Systems/zombie-zip: Malformed ZIP archive that evades antivirus detection by declaring Method=0 (stored) while containing DEFLATE-compressed payload.plus-squaregithub.comexternal-linkmessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGitHub - Bombadil-Systems/zombie-zip: Malformed ZIP archive that evades antivirus detection by declaring Method=0 (stored) while containing DEFLATE-compressed payload.plus-squaregithub.comZerush@lemmy.ml · 5 days agomessage-square2linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 days agoAI Agent Hacks McKinseyplus-squarecodewall.aiexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkAI Agent Hacks McKinseyplus-squarecodewall.ai☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 days agomessage-square1linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 7 days agoRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 7 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 10 days agoFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comZerush@lemmy.ml · 10 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 11 days agoGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comexternal-linkmessage-square1linkfedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 11 days agomessage-square1linkfedilink
Zerush@lemmy.ml · 11 days agoGlobal phishing-as-a-service platform taken down in coordinated public-private actionplus-squarewww.europol.europa.euexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGlobal phishing-as-a-service platform taken down in coordinated public-private actionplus-squarewww.europol.europa.euZerush@lemmy.ml · 11 days agomessage-square0linkfedilink
davel [he/him]@lemmy.mlEnglish · edit-214 days agoNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comexternal-linkmessage-square7linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comdavel [he/him]@lemmy.mlEnglish · edit-214 days agomessage-square7linkfedilink
Zerush@lemmy.ml · 14 days agohackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkhackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioZerush@lemmy.ml · 14 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 14 days agoVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 14 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 19 days agoFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 19 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 21 days agoAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comZerush@lemmy.ml · 21 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agoWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.comexternal-linkmessage-square1linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 22 days agomessage-square1linkfedilink
Cedric@lemmy.mlEnglish · 26 days agoVulnerability Report - January 2026plus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareVulnerability Report - January 2026plus-squareCedric@lemmy.mlEnglish · 26 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 27 days agoPassword managers less secure than promisedplus-squareethz.chexternal-linkmessage-square3linkfedilinkarrow-up122arrow-down12
arrow-up120arrow-down1external-linkPassword managers less secure than promisedplus-squareethz.chZerush@lemmy.ml · 27 days agomessage-square3linkfedilink
Cedric@lemmy.mlEnglish · 28 days agoVulnerability-Lookup 4.0.0 is out – Federation is hereplus-squaremessage-squaremessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1message-squareVulnerability-Lookup 4.0.0 is out – Federation is hereplus-squareCedric@lemmy.mlEnglish · 28 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 1 month agoFake AI Chrome extensions with 300K users steal credentials, emailsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3linkfedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkFake AI Chrome extensions with 300K users steal credentials, emailsplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 1 month agomessage-square3linkfedilink
Zerush@lemmy.ml · 1 month agoFake 7-Zip downloads are turning home PCs into proxy nodesplus-squarewww.malwarebytes.comexternal-linkmessage-square6linkfedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkFake 7-Zip downloads are turning home PCs into proxy nodesplus-squarewww.malwarebytes.comZerush@lemmy.ml · 1 month agomessage-square6linkfedilink