kryllic@programming.devEnglish · 4 months agoCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkCloudflare's recent blog regarding polyfill shows that Cloudflare never authorized Polyfill to use their name in their productplus-squareblog.cloudflare.comkryllic@programming.devEnglish · 4 months agomessage-square0fedilink
testeronious@lemmy.worldEnglish · 9 months agoOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.ioexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.iotesteronious@lemmy.worldEnglish · 9 months agomessage-square0fedilink
testeronious@lemmy.worldEnglish · 9 months agoLockbit Ransomeware global taketownplus-squarewww.itnews.com.auexternal-linkmessage-square1fedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkLockbit Ransomeware global taketownplus-squarewww.itnews.com.autesteronious@lemmy.worldEnglish · 9 months agomessage-square1fedilink
testeronious@lemmy.worldEnglish · 9 months agoIvanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXEplus-squareblog.securelayer7.netexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkIvanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXEplus-squareblog.securelayer7.nettesteronious@lemmy.worldEnglish · 9 months agomessage-square0fedilink
testeronious@lemmy.worldEnglish · 9 months agoTop 10 web hacking techniques of 2023plus-squareportswigger.netexternal-linkmessage-square0fedilinkarrow-up110arrow-down13
arrow-up17arrow-down1external-linkTop 10 web hacking techniques of 2023plus-squareportswigger.nettesteronious@lemmy.worldEnglish · 9 months agomessage-square0fedilink
testeronious@lemmy.worldEnglish · 9 months agoExploiting Unsynchronised Clocksplus-squareattackshipsonfi.reexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkExploiting Unsynchronised Clocksplus-squareattackshipsonfi.retesteronious@lemmy.worldEnglish · 9 months agomessage-square0fedilink
testeronious@lemmy.worldEnglish · 9 months agoMicrosoft 365 AiTM detection: the lessons learnedplus-squarezolder.ioexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkMicrosoft 365 AiTM detection: the lessons learnedplus-squarezolder.iotesteronious@lemmy.worldEnglish · 9 months agomessage-square0fedilink
testeronious@lemmy.world · 9 months agoSnap Trap: The Hidden Dangers Within Ubuntu's Package Suggestion Systemplus-squarewww.aquasec.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkSnap Trap: The Hidden Dangers Within Ubuntu's Package Suggestion Systemplus-squarewww.aquasec.comtesteronious@lemmy.world · 9 months agomessage-square0fedilink
LinearArray@programming.devMEnglish · 9 months agoCyber Attacks Spike Suddenly Prior to Taiwan’s Electionplus-squarewww.voanews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCyber Attacks Spike Suddenly Prior to Taiwan’s Electionplus-squarewww.voanews.comLinearArray@programming.devMEnglish · 9 months agomessage-square0fedilink
LinearArray@programming.devMEnglish · 9 months ago83% of Indian cybersecurity, IT workers impacted by burnout, fatigue: Report - Social News XYZplus-squarewww.socialnews.xyzexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-link83% of Indian cybersecurity, IT workers impacted by burnout, fatigue: Report - Social News XYZplus-squarewww.socialnews.xyzLinearArray@programming.devMEnglish · 9 months agomessage-square0fedilink
testeronious@lemmy.world · 9 months agoChatGPT Account Takeover via Wildcard Web Cache Deceptionplus-squarenokline.github.ioexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkChatGPT Account Takeover via Wildcard Web Cache Deceptionplus-squarenokline.github.iotesteronious@lemmy.world · 9 months agomessage-square0fedilink
testeronious@lemmy.world · 9 months agoBreach Analysis: APT29’s Attack on Microsoft - Password Spray & OAuth abuse.plus-squarewww.cyberark.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkBreach Analysis: APT29’s Attack on Microsoft - Password Spray & OAuth abuse.plus-squarewww.cyberark.comtesteronious@lemmy.world · 9 months agomessage-square0fedilink
FlumPHP@programming.dev · 9 months agoI Know What Your Password Was Last Summer...plus-squarelabs.lares.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkI Know What Your Password Was Last Summer...plus-squarelabs.lares.comFlumPHP@programming.dev · 9 months agomessage-square0fedilink
Sparrow_1029@programming.dev · 9 months agoReverse Engineering & De-clouding a smart deviceplus-squarejmswrnr.comexternal-linkmessage-square1fedilinkarrow-up138arrow-down10
arrow-up138arrow-down1external-linkReverse Engineering & De-clouding a smart deviceplus-squarejmswrnr.comSparrow_1029@programming.dev · 9 months agomessage-square1fedilink
canpolat@programming.devEnglish · 9 months agoIn major gaffe, hacked Microsoft test account was assigned admin privilegesplus-squarearstechnica.comexternal-linkmessage-square3fedilinkarrow-up149arrow-down12
arrow-up147arrow-down1external-linkIn major gaffe, hacked Microsoft test account was assigned admin privilegesplus-squarearstechnica.comcanpolat@programming.devEnglish · 9 months agomessage-square3fedilink
HiddenLayer5@lemmy.mlEnglish · 10 months agoIt is possible to extract encryption keys by recording coil whine with a phone next to the computer (2013 paper)plus-squareweb.archive.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIt is possible to extract encryption keys by recording coil whine with a phone next to the computer (2013 paper)plus-squareweb.archive.orgHiddenLayer5@lemmy.mlEnglish · 10 months agomessage-square0fedilink
solidsnail@programming.dev · 11 months agonpm search RCE? - Escape Sequence Injectionplus-squareblog.solidsnail.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down12
arrow-up16arrow-down1external-linknpm search RCE? - Escape Sequence Injectionplus-squareblog.solidsnail.comsolidsnail@programming.dev · 11 months agomessage-square0fedilink
solidsnail@programming.dev · 11 months agoIt’s not a Feature, It’s a Vulnerabilityplus-squareblog.solidsnail.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkIt’s not a Feature, It’s a Vulnerabilityplus-squareblog.solidsnail.comsolidsnail@programming.dev · 11 months agomessage-square0fedilink
Rick_C137@programming.devEnglish · 1 year agoHow asymmetrically encrypt under windows ( CLI )plus-squaremessage-squaremessage-square4fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareHow asymmetrically encrypt under windows ( CLI )plus-squareRick_C137@programming.devEnglish · 1 year agomessage-square4fedilink
Rick_C137@programming.devEnglish · edit-21 year agoWTF website certificates chain of trust...plus-squaremessage-squaremessage-square11fedilinkarrow-up12arrow-down18
arrow-up1-6arrow-down1message-squareWTF website certificates chain of trust...plus-squareRick_C137@programming.devEnglish · edit-21 year agomessage-square11fedilink