cm0002@libretechni.ca · 20 hours agoAI Agent Hacks McKinseyplus-squarecodewall.aiexternal-linkmessage-square1linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkAI Agent Hacks McKinseyplus-squarecodewall.aicm0002@libretechni.ca · 20 hours agomessage-square1linkfedilink
shellsharks@infosec.pubM · 2 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square2linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 2 days agomessage-square2linkfedilink
cm0002@libretechni.ca · 3 days agoRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comexternal-linkmessage-square4linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comcm0002@libretechni.ca · 3 days agomessage-square4linkfedilink
Innerworld@lemmy.world · 4 days agoCountries with Most Personal Records Leaked in Data Breaches (2004-2025)imagemessage-square2linkfedilinkarrow-up117arrow-down11
arrow-up116arrow-down1imageCountries with Most Personal Records Leaked in Data Breaches (2004-2025)Innerworld@lemmy.world · 4 days agomessage-square2linkfedilink
shellsharks@infosec.pubM · 3 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 3 days agomessage-square0linkfedilink
cm0002@lemmings.world · 7 days agoGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comexternal-linkmessage-square1linkfedilinkarrow-up149arrow-down12
arrow-up147arrow-down1external-linkGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comcm0002@lemmings.world · 7 days agomessage-square1linkfedilink
cm0002@lemmings.world · 6 days agoFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comcm0002@lemmings.world · 6 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 6 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 6 days agomessage-square0linkfedilink
cm0002@lemmings.world · 7 days agoI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down13
arrow-up15arrow-down1external-linkI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workcm0002@lemmings.world · 7 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 8 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 8 days agomessage-square0linkfedilink
cm0002@lemmings.world · 10 days agoNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comexternal-linkmessage-square2linkfedilinkarrow-up131arrow-down11
arrow-up130arrow-down1external-linkNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comcm0002@lemmings.world · 10 days agomessage-square2linkfedilink
cm0002@lemmings.world · 10 days agohackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkhackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.iocm0002@lemmings.world · 10 days agomessage-square0linkfedilink
cm0002@lemmings.world · 10 days agoVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgcm0002@lemmings.world · 10 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 10 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 10 days agomessage-square0linkfedilink
Valnao@sh.itjust.works · 14 days agoHow Russia is intercepting communications from European satellitesplus-squaretheconversation.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-linkHow Russia is intercepting communications from European satellitesplus-squaretheconversation.comValnao@sh.itjust.works · 14 days agomessage-square0linkfedilink
cm0002@infosec.pub · 15 days agoFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comexternal-linkmessage-square1linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comcm0002@infosec.pub · 15 days agomessage-square1linkfedilink
Innerworld@lemmy.world · 15 days agoGoogle disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theftplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkGoogle disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theftplus-squarewww.reuters.comInnerworld@lemmy.world · 15 days agomessage-square0linkfedilink
Innerworld@lemmy.world · 15 days agoUnknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026plus-squarewww.bloomberg.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkUnknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026plus-squarewww.bloomberg.comInnerworld@lemmy.world · 15 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 15 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 15 days agomessage-square1linkfedilink
cm0002 · 17 days agoAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comcm0002 · 17 days agomessage-square0linkfedilink