videodrome@lemmy.capebreton.socialM · 1 year agoMicrosoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkMicrosoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square1linkfedilink
tallship@piefed.social · 1 year agoThe Woman Who Smashed Codes: The Untold Story of Cryptography Pioneer Elizebeth Friedmanplus-squaregetpocket.comexternal-linkmessage-square0linkfedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkThe Woman Who Smashed Codes: The Untold Story of Cryptography Pioneer Elizebeth Friedmanplus-squaregetpocket.comtallship@piefed.social · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoSecure by Design Alert: Eliminating SQL Injection Vulnerabilities in Software | CISAplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkSecure by Design Alert: Eliminating SQL Injection Vulnerabilities in Software | CISAplus-squarewww.cisa.govvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoRecord mega breach in France impacts up to 43 million peopleplus-squarewww.theregister.comexternal-linkmessage-square5linkfedilinkarrow-up139arrow-down10
arrow-up139arrow-down1external-linkRecord mega breach in France impacts up to 43 million peopleplus-squarewww.theregister.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square5linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoMicrosoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkMicrosoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence - Cado Security | Cloud Forensics & Incident Responseplus-squarewww.cadosecurity.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence - Cado Security | Cloud Forensics & Incident Responseplus-squarewww.cadosecurity.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoPHRACK # 71 CALL FOR PAPERSwww.phrack.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPHRACK # 71 CALL FOR PAPERSwww.phrack.orgvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoCyberattack Paralyzes the Largest U.S. Health Care Payment Systemplus-squarewww.nytimes.comexternal-linkmessage-square1linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkCyberattack Paralyzes the Largest U.S. Health Care Payment Systemplus-squarewww.nytimes.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square1linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoVMware urges emergency action to blunt hypervisor flawsplus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVMware urges emergency action to blunt hypervisor flawsplus-squarewww.theregister.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square1linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoHackers exploited Windows 0-day for 6 months after Microsoft knew of itplus-squarearstechnica.comexternal-linkmessage-square7linkfedilinkarrow-up181arrow-down11
arrow-up180arrow-down1external-linkHackers exploited Windows 0-day for 6 months after Microsoft knew of itplus-squarearstechnica.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square7linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.comexternal-linkmessage-square1linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square1linkfedilink
vikingqueef@lemmy.world · 1 year agoLiteSpeed Cache Plugin Exposes 5 Million WordPress Sites to Privilege Escalation | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkLiteSpeed Cache Plugin Exposes 5 Million WordPress Sites to Privilege Escalation | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comvikingqueef@lemmy.world · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoThe US has overtaken Russia as the most-breached countryplus-squarewww.techspot.comexternal-linkmessage-square1linkfedilinkarrow-up165arrow-down11
arrow-up164arrow-down1external-linkThe US has overtaken Russia as the most-breached countryplus-squarewww.techspot.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square1linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down11cross-posted to: [email protected]
arrow-up114arrow-down1external-linkNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilinkcross-posted to: [email protected]
videodrome@lemmy.capebreton.socialM · 1 year agoFeds hack LockBit, LockBit springs back. Now what? | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square1linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkFeds hack LockBit, LockBit springs back. Now what? | TechCrunchplus-squaretechcrunch.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square1linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoUpdated: Top Cyber Actions for Securing Water Systems | CISAplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkUpdated: Top Cyber Actions for Securing Water Systems | CISAplus-squarewww.cisa.govvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoCanadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Securityplus-squarekrebsonsecurity.comexternal-linkmessage-square2linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCanadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Securityplus-squarekrebsonsecurity.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square2linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoCredentials are Still King: Leaked Credentials, Data Breaches and Dark Web Marketsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCredentials are Still King: Leaked Credentials, Data Breaches and Dark Web Marketsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilink
videodrome@lemmy.capebreton.socialM · 1 year agoPixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack.plus-squareblog.quarkslab.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack.plus-squareblog.quarkslab.comvideodrome@lemmy.capebreton.socialM · 1 year agomessage-square0linkfedilink