Cedric@lemmy.mlEnglish · 5 days agoVulnerability-Lookup 2.9.0 - MITRE EMB3D, GCVEplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkVulnerability-Lookup 2.9.0 - MITRE EMB3D, GCVEplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 5 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 10 days agoChina's cybersecurity center discloses malicious foreign websites and IP addresses, mainly from US, Sweden and Indiaplus-squarewww.globaltimes.cnexternal-linkmessage-square5linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkChina's cybersecurity center discloses malicious foreign websites and IP addresses, mainly from US, Sweden and Indiaplus-squarewww.globaltimes.cn☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 10 days agomessage-square5linkfedilink
Cedric@lemmy.mlEnglish · 11 days ago🚨 April 2025 Vulnerability Report is out! 🚨plus-squaremessage-squaremessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1message-square🚨 April 2025 Vulnerability Report is out! 🚨plus-squareCedric@lemmy.mlEnglish · 11 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · edit-214 days agoA Python client for the Global CVE Allocation System.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkA Python client for the Global CVE Allocation System.plus-squaregithub.comCedric@lemmy.mlEnglish · edit-214 days agomessage-square0linkfedilink
HiddenLayer555@lemmy.mlEnglish · edit-226 days agoVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comHiddenLayer555@lemmy.mlEnglish · edit-226 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 26 days agoGCVE: Global CVE Allocation Systemplus-squaregcve.euexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkGCVE: Global CVE Allocation Systemplus-squaregcve.euCedric@lemmy.mlEnglish · 26 days agomessage-square1linkfedilink
Arthur Besse@lemmy.mlEnglish · 26 days agoHomeland Security funding for CVE program expiresplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up135arrow-down12
arrow-up133arrow-down1external-linkHomeland Security funding for CVE program expiresplus-squarewww.theregister.comArthur Besse@lemmy.mlEnglish · 26 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkGoogle fixes two Android zero-day bugs actively exploited by hackersplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Zerush@lemmy.ml · 1 month agoHacker hacked hackersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHacker hacked hackersplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 1 month agomessage-square0linkfedilink
maltfield@lemmy.ml · 1 month agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square7linkfedilinkarrow-up110arrow-down16
arrow-up14arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@lemmy.ml · 1 month agomessage-square7linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkTwitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Jobplus-squarehackread.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.euexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkMessaging app Signal threatens to leave France over anti-encryption demandsplus-squarebrusselssignal.eu☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agoThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 2 months agoRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkRegularly updated Hugging Face datasets and models for software vulnerabilitiesplus-squarehuggingface.coCedric@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink
Cedric@lemmy.ml · 2 months agoLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkLLMs + Vulnerability-Lookup: What We’re Testing and Where We’re Headedplus-squarewww.vulnerability-lookup.orgCedric@lemmy.ml · 2 months agomessage-square0linkfedilink
Arthur Besse@lemmy.mlEnglish · 3 months agotwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linktwo OpenSSH vulnerabilities fixed: one allowed MITM against clients which had enabled VerifyHostKeyDNS, the other allowed pre-auth DoSplus-squareblog.qualys.comArthur Besse@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 3 months agoVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkVulnerability-Lookup 2.6.0 Released — Advanced monitoring tools for administrators of Vulnerability-Lookup instancesplus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkExclusive: Spyware maker caught distributing malicious Android apps for yearsplus-squaretechcrunch.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink
Zerush@lemmy.ml · 3 months agoMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkMassive brute force attack uses 2.8 million IPs to target VPN devicesplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 3 months agomessage-square1linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoVSCode’s SSH Agent Is Bananasplus-squarefly.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkVSCode’s SSH Agent Is Bananasplus-squarefly.io☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0linkfedilink