KasTas@group.ltEnglish · 1 day agoClone2Leak: Your Git Credentials Belong To Usplus-squareflatt.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClone2Leak: Your Git Credentials Belong To Usplus-squareflatt.techKasTas@group.ltEnglish · 1 day agomessage-square0fedilink
I eat words@group.ltMEnglish · 12 days agoBypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blogplus-squareoddlama.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blogplus-squareoddlama.orgI eat words@group.ltMEnglish · 12 days agomessage-square0fedilink
KasTas@group.ltEnglish · 15 days agoRemote code execution on public RSync <3.4.0 serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRemote code execution on public RSync <3.4.0 serversplus-squarewww.bleepingcomputer.comKasTas@group.ltEnglish · 15 days agomessage-square0fedilink
I eat words@group.ltMEnglish · 2 months agoPluralistic: China hacked Verizon, AT&T and Lumen using the FBI’s backdoor (07 Oct 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPluralistic: China hacked Verizon, AT&T and Lumen using the FBI’s backdoor (07 Oct 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netI eat words@group.ltMEnglish · 2 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 3 months agoGibler - How to 10X Your Securityplus-squaredocs.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGibler - How to 10X Your Securityplus-squaredocs.google.comI eat words@group.ltMEnglish · 3 months agomessage-square0fedilink
KasTas@group.ltEnglish · 3 months agoWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comKasTas@group.ltEnglish · 3 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 3 months agoThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat actors exploit zero days within 5 days, says Google's Mandiantplus-squarewww.scworld.comI eat words@group.ltMEnglish · 3 months agomessage-square0fedilink
KasTas@group.ltEnglish · 3 months agoAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netKasTas@group.ltEnglish · 3 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 4 months agoArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkArtificial Intelligence Is Accelerating Iranian Cyber Operationsplus-squarewww.lawfaremedia.orgI eat words@group.ltMEnglish · 4 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 5 months agoSecurity Advisory YSA-2024-03plus-squarewww.yubico.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity Advisory YSA-2024-03plus-squarewww.yubico.comI eat words@group.ltMEnglish · 5 months agomessage-square0fedilink
RGB@group.ltEnglish · 5 months agoChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese government hackers penetrate U.S. internet providers to spyplus-squarewww.washingtonpost.comRGB@group.ltEnglish · 5 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 5 months agoIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIs Telegram really an encrypted messaging app?plus-squareblog.cryptographyengineering.comI eat words@group.ltMEnglish · 5 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 5 months agoHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwideplus-squarethehackernews.comI eat words@group.ltMEnglish · 5 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 6 months agoWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhite House Report: U.S. Federal Agencies Brace for $7.1 Billion Post-Quantum Cryptography Migrationplus-squarethequantuminsider.comI eat words@group.ltMEnglish · 6 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 6 months agooss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkoss-sec: RE: Neat VNC Security Vulnerabilityplus-squareseclists.orgI eat words@group.ltMEnglish · 6 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 6 months agoMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMillions of Devices Vulnerable to 'PKFail' Secure Boot Bypass Issueplus-squarewww.darkreading.comI eat words@group.ltMEnglish · 6 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 7 months agoA Leak of Biometric Police Data Is a Sign of Things to Comeplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Leak of Biometric Police Data Is a Sign of Things to Comeplus-squarewww.wired.comI eat words@group.ltMEnglish · 7 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 7 months agoWhen Regulation Encourages ISPs to Hack Their Customersplus-squarenews.risky.bizexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen Regulation Encourages ISPs to Hack Their Customersplus-squarenews.risky.bizI eat words@group.ltMEnglish · 7 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 7 months agoregreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)plus-squarewww.qualys.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkregreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)plus-squarewww.qualys.comI eat words@group.ltMEnglish · 7 months agomessage-square0fedilink
I eat words@group.ltMEnglish · 7 months agoPluralistic: The reason you can’t buy a car is the same reason that your health insurer let hackers dox you (28 Jun 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPluralistic: The reason you can’t buy a car is the same reason that your health insurer let hackers dox you (28 Jun 2024) – Pluralistic: Daily links from Cory Doctorowplus-squarepluralistic.netI eat words@group.ltMEnglish · 7 months agomessage-square0fedilink