videodrome@lemmy.capebreton.socialM · 7 months agoMicrosoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkMicrosoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 7 months agomessage-square1fedilink
tallship@piefed.social · 7 months agoThe Woman Who Smashed Codes: The Untold Story of Cryptography Pioneer Elizebeth Friedmanplus-squaregetpocket.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkThe Woman Who Smashed Codes: The Untold Story of Cryptography Pioneer Elizebeth Friedmanplus-squaregetpocket.comtallship@piefed.social · 7 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 7 months agoSecure by Design Alert: Eliminating SQL Injection Vulnerabilities in Software | CISAwww.cisa.govexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkSecure by Design Alert: Eliminating SQL Injection Vulnerabilities in Software | CISAwww.cisa.govvideodrome@lemmy.capebreton.socialM · 7 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoRecord mega breach in France impacts up to 43 million peopleplus-squarewww.theregister.comexternal-linkmessage-square5fedilinkarrow-up139arrow-down10
arrow-up139arrow-down1external-linkRecord mega breach in France impacts up to 43 million peopleplus-squarewww.theregister.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square5fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoMicrosoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkMicrosoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence - Cado Security | Cloud Forensics & Incident Responseplus-squarewww.cadosecurity.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence - Cado Security | Cloud Forensics & Incident Responseplus-squarewww.cadosecurity.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoPHRACK # 71 CALL FOR PAPERSwww.phrack.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPHRACK # 71 CALL FOR PAPERSwww.phrack.orgvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoCyberattack Paralyzes the Largest U.S. Health Care Payment Systemplus-squarewww.nytimes.comexternal-linkmessage-square1fedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkCyberattack Paralyzes the Largest U.S. Health Care Payment Systemplus-squarewww.nytimes.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square1fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoVMware urges emergency action to blunt hypervisor flawsplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVMware urges emergency action to blunt hypervisor flawsplus-squarewww.theregister.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square1fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoHackers exploited Windows 0-day for 6 months after Microsoft knew of itplus-squarearstechnica.comexternal-linkmessage-square7fedilinkarrow-up181arrow-down11
arrow-up180arrow-down1external-linkHackers exploited Windows 0-day for 6 months after Microsoft knew of itplus-squarearstechnica.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square7fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square1fedilink
vikingqueef@lemmy.world · 8 months agoLiteSpeed Cache Plugin Exposes 5 Million WordPress Sites to Privilege Escalation | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkLiteSpeed Cache Plugin Exposes 5 Million WordPress Sites to Privilege Escalation | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comvikingqueef@lemmy.world · 8 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoThe US has overtaken Russia as the most-breached countryplus-squarewww.techspot.comexternal-linkmessage-square1fedilinkarrow-up165arrow-down11
arrow-up164arrow-down1external-linkThe US has overtaken Russia as the most-breached countryplus-squarewww.techspot.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square1fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govexternal-linkmessage-square0fedilinkarrow-up115arrow-down11cross-posted to: cybersecurity@lemmy.capebreton.social
arrow-up114arrow-down1external-linkNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square0fedilinkcross-posted to: cybersecurity@lemmy.capebreton.social
videodrome@lemmy.capebreton.socialM · 8 months agoFeds hack LockBit, LockBit springs back. Now what? | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square1fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkFeds hack LockBit, LockBit springs back. Now what? | TechCrunchplus-squaretechcrunch.comvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square1fedilink
videodrome@lemmy.capebreton.socialM · 8 months agoUpdated: Top Cyber Actions for Securing Water Systems | CISAwww.cisa.govexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkUpdated: Top Cyber Actions for Securing Water Systems | CISAwww.cisa.govvideodrome@lemmy.capebreton.socialM · 8 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 10 months agoCanadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Securityplus-squarekrebsonsecurity.comexternal-linkmessage-square2fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCanadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Securityplus-squarekrebsonsecurity.comvideodrome@lemmy.capebreton.socialM · 10 months agomessage-square2fedilink
videodrome@lemmy.capebreton.socialM · 10 months agoCredentials are Still King: Leaked Credentials, Data Breaches and Dark Web Marketsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCredentials are Still King: Leaked Credentials, Data Breaches and Dark Web Marketsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 10 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 10 months agoPixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack.plus-squareblog.quarkslab.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack.plus-squareblog.quarkslab.comvideodrome@lemmy.capebreton.socialM · 10 months agomessage-square0fedilink