melroy@kbin.melroy.org · 2 months agoIpset Hash is full, cannot add more elementsplus-squarekbin.melroy.orgimagemessage-square1fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1imageIpset Hash is full, cannot add more elementsplus-squarekbin.melroy.orgmelroy@kbin.melroy.org · 2 months agomessage-square1fedilink
Lightscription@lemmy.world · edit-23 months agoHow can 2FA be disabled without permission and what can I do about it?plus-squaremessage-squaremessage-square3fedilinkarrow-up16arrow-down13
arrow-up13arrow-down1message-squareHow can 2FA be disabled without permission and what can I do about it?plus-squareLightscription@lemmy.world · edit-23 months agomessage-square3fedilink
lettruthout@lemmy.worldEnglish · edit-27 months agoIs this come kind of hack attempt?plus-squaremessage-squaremessage-square4fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareIs this come kind of hack attempt?plus-squarelettruthout@lemmy.worldEnglish · edit-27 months agomessage-square4fedilink
L4sBot@lemmy.worldB · 8 months agoGhidra training classes from NSAplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkGhidra training classes from NSAplus-squaregithub.comL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoAn intro to automated evasion and compilation of .NET offensive toolsplus-squaretierzerosecurity.co.nzexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAn intro to automated evasion and compilation of .NET offensive toolsplus-squaretierzerosecurity.co.nzL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoPhrack #71: Call For Paperplus-squarewww.phrack.orgexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkPhrack #71: Call For Paperplus-squarewww.phrack.orgL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
wizardbeard@lemmy.dbzer0.comEnglish · 8 months agoNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govwizardbeard@lemmy.dbzer0.comEnglish · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoHacking Terraform state to gain code execution and privilege escalationplus-squareblog.plerion.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkHacking Terraform state to gain code execution and privilege escalationplus-squareblog.plerion.comL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoData Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoorplus-squarejfrog.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkData Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoorplus-squarejfrog.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoNew Server Side Prototype Pollution Gadgets Scanner from Doyensecplus-squareblog.doyensec.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew Server Side Prototype Pollution Gadgets Scanner from Doyensecplus-squareblog.doyensec.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoIt's now possible to find the AWS Account ID for any S3 Bucket (private or public)plus-squaretracebit.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkIt's now possible to find the AWS Account ID for any S3 Bucket (private or public)plus-squaretracebit.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months ago“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emailsplus-squarelabs.guard.ioexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-link“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emailsplus-squarelabs.guard.ioL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoSEO Poisoning to Domain Control: The Gootloader Saga Continuesplus-squarethedfirreport.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkSEO Poisoning to Domain Control: The Gootloader Saga Continuesplus-squarethedfirreport.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoCode injection or backdoor: A new look at Ivanti's CVE-2021-44529plus-squarewww.labs.greynoise.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCode injection or backdoor: A new look at Ivanti's CVE-2021-44529plus-squarewww.labs.greynoise.ioL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoPython Risk Identification Tool for generative AI (PyRIT)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down12
arrow-up10arrow-down1external-linkPython Risk Identification Tool for generative AI (PyRIT)plus-squaregithub.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoNew TP-Link authentication Bypass!plus-squaressd-disclosure.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew TP-Link authentication Bypass!plus-squaressd-disclosure.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoOptum / Change Healthcare Breachplus-squarestatus.changehealthcare.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkOptum / Change Healthcare Breachplus-squarestatus.changehealthcare.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.ioexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.ioL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoLockbit Ransomeware global taketownplus-squarewww.itnews.com.auexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkLockbit Ransomeware global taketownplus-squarewww.itnews.com.auL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoGitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPFplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPFplus-squaregithub.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink