Cedric@lemmy.mlEnglish · 16 days agoLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squaremessage-squaremessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1message-squareLooking for Lemmy accounts about software vulnerabilities, CVEs, etc.plus-squareCedric@lemmy.mlEnglish · 16 days agomessage-square2fedilink
Tender@lemmy.dbzer0.com · edit-216 days agoshopping issueplus-squaremessage-squaremessage-square10fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareshopping issueplus-squareTender@lemmy.dbzer0.com · edit-216 days agomessage-square10fedilink
Arthur Besse@lemmy.mlEnglish · edit-22 months agoLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comArthur Besse@lemmy.mlEnglish · edit-22 months agomessage-square0fedilink
Cedric@lemmy.ml · 3 months agoVulnerability Lookup 1.5.0plus-squarelemmy.mlimagemessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1imageVulnerability Lookup 1.5.0plus-squarelemmy.mlCedric@lemmy.ml · 3 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 3 months ago"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comexternal-linkmessage-square0fedilinkarrow-up125arrow-down11
arrow-up124arrow-down1external-link"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comArthur Besse@lemmy.mlEnglish · 3 months agomessage-square0fedilink
wihkum@lemmy.todayEnglish · 3 months agoWihkum - Emergency Response App for Schools in 2024plus-squarewihkum.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkWihkum - Emergency Response App for Schools in 2024plus-squarewihkum.comwihkum@lemmy.todayEnglish · 3 months agomessage-square1fedilink
Cedric@lemmy.ml · 4 months agoVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comCedric@lemmy.ml · 4 months agomessage-square0fedilink
hetzlemmingsworld@lemmings.world · edit-25 months agoHow to avoid phishing fraud scamplus-squaremessage-squaremessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1message-squareHow to avoid phishing fraud scamplus-squarehetzlemmingsworld@lemmings.world · edit-25 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 5 months agoFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comexternal-linkmessage-square2fedilinkarrow-up140arrow-down10
arrow-up140arrow-down1external-linkFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comArthur Besse@lemmy.mlEnglish · 5 months agomessage-square2fedilink
BusKill@lemmy.kde.social · 5 months agoBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up15arrow-down13
arrow-up12arrow-down1external-linkBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inBusKill@lemmy.kde.social · 5 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 6 months agoHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netlemmyreader@lemmy.mlEnglish · 6 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 6 months agoBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.euexternal-linkmessage-square4fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkBIMI and DMARC Can't Save You: The Overlooked DKIM Exploitplus-squarewww.zone.eulemmyreader@lemmy.mlEnglish · 6 months agomessage-square4fedilink
lemmyreader@lemmy.mlEnglish · 6 months ago16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infoexternal-linkmessage-square0fedilinkarrow-up123arrow-down11
arrow-up122arrow-down1external-link16 years of CVE-2008-0166 - Debian OpenSSL Bugplus-square16years.secvuln.infolemmyreader@lemmy.mlEnglish · 6 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 6 months agoNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comexternal-linkmessage-square21fedilinkarrow-up131arrow-down14
arrow-up127arrow-down1external-linkNovel attack against virtually all VPN apps neuters their entire purposeplus-squarearstechnica.comArthur Besse@lemmy.mlEnglish · 6 months agomessage-square21fedilink
maegul (he/they)@lemmy.mlEnglish · 7 months agoHow well can an employer be certain of a remote employee's geographical location?plus-squaremessage-squaremessage-square3fedilinkarrow-up116arrow-down11
arrow-up115arrow-down1message-squareHow well can an employer be certain of a remote employee's geographical location?plus-squaremaegul (he/they)@lemmy.mlEnglish · 7 months agomessage-square3fedilink
lemmyreader@lemmy.mlEnglish · 7 months agoStealing your Telegram account in 10 seconds flatplus-squarelyra.horseexternal-linkmessage-square0fedilinkarrow-up117arrow-down13
arrow-up114arrow-down1external-linkStealing your Telegram account in 10 seconds flatplus-squarelyra.horselemmyreader@lemmy.mlEnglish · 7 months agomessage-square0fedilink
t0mri@lemmy.ml · 7 months agoA doubt in encryptionplus-squarelemmy.mlimagemessage-square25fedilinkarrow-up140arrow-down111
arrow-up129arrow-down1imageA doubt in encryptionplus-squarelemmy.mlt0mri@lemmy.ml · 7 months agomessage-square25fedilink
lemmyreader@lemmy.mlEnglish · 7 months agoComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comexternal-linkmessage-square1fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkComputer scientists unveil novel attacks on cybersecurityplus-squarewww.sciencedaily.comlemmyreader@lemmy.mlEnglish · 7 months agomessage-square1fedilink
lemmyreader@lemmy.mlEnglish · 7 months agoPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.auexternal-linkmessage-square5fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkPasskeys: A Shattered Dreamplus-squarefy.blackhats.net.aulemmyreader@lemmy.mlEnglish · 7 months agomessage-square5fedilink
lemmyreader@lemmy.mlEnglish · 7 months agoAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkAfter XZ Utils, More Open-Source Maintainers Under Attackplus-squarewww.bankinfosecurity.comlemmyreader@lemmy.mlEnglish · 7 months agomessage-square1fedilink