Aconite33@lemmy.worldEnglish · edit-21 month agoBBoT 2.0 Released!plus-squareblog.blacklanternsecurity.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBBoT 2.0 Released!plus-squareblog.blacklanternsecurity.comAconite33@lemmy.worldEnglish · edit-21 month agomessage-square0fedilink
maltfield@monero.townEnglish · 2 months ago3TOFU: Verifying Unsigned Releasesplus-squaretech.michaelaltfield.netexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-link3TOFU: Verifying Unsigned Releasesplus-squaretech.michaelaltfield.netmaltfield@monero.townEnglish · 2 months agomessage-square0fedilink
Optional@lemmy.worldEnglish · 5 months agoMicrosoft left internal passwords exposed in latest security blunderplus-squarewww.theverge.comexternal-linkmessage-square1fedilinkarrow-up125arrow-down12
arrow-up123arrow-down1external-linkMicrosoft left internal passwords exposed in latest security blunderplus-squarewww.theverge.comOptional@lemmy.worldEnglish · 5 months agomessage-square1fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoGalactical Bug Hunting: How we discovered new issues in CD Projekt Red’s Gaming Platformplus-squarewww.anvilsecure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGalactical Bug Hunting: How we discovered new issues in CD Projekt Red’s Gaming Platformplus-squarewww.anvilsecure.comrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoDon't trust the cache :Exposing Web cache vulnerabilitiesplus-squareanasbetis023.medium.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkDon't trust the cache :Exposing Web cache vulnerabilitiesplus-squareanasbetis023.medium.comrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoWifi credential dumpingplus-squarewww.r-tec.netexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkWifi credential dumpingplus-squarewww.r-tec.netrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoDiving Deeper into AI Package Hallucinationsplus-squarewww.lasso.securityexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDiving Deeper into AI Package Hallucinationsplus-squarewww.lasso.securityrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoSecurity Advisory: Systems with a SONIX Technology Webcam vulnerable to DLL hijacking attack allowing attackers to execute malicious DLL and escalate privilegesplus-squareherolab.usd.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity Advisory: Systems with a SONIX Technology Webcam vulnerable to DLL hijacking attack allowing attackers to execute malicious DLL and escalate privilegesplus-squareherolab.usd.derepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agounch 😗: Hides message with invisible Unicode charactersplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkunch 😗: Hides message with invisible Unicode charactersplus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoGram - Self-hosted Threat Modeling Webappplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGram - Self-hosted Threat Modeling Webappplus-squaregithub.comrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoKobold letters – Why HTML emails are a risk to your organizationplus-squarelutrasecurity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkKobold letters – Why HTML emails are a risk to your organizationplus-squarelutrasecurity.comrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoShowcasing Incinerator a Powerful Android Malware Reversing Toolplus-squareboschko.caexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkShowcasing Incinerator a Powerful Android Malware Reversing Toolplus-squareboschko.carepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoAttacking Active Directory Certificate Service Part 2plus-squarevandanpathak.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttacking Active Directory Certificate Service Part 2plus-squarevandanpathak.comrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilink
repostbot33@lemmy.worldBEnglish · 6 months agoPersistence - DLL Proxy Loadingplus-squarepentestlab.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10cross-posted to: netsec@lemmy.world
arrow-up11arrow-down1external-linkPersistence - DLL Proxy Loadingplus-squarepentestlab.blogrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilinkcross-posted to: netsec@lemmy.world
repostbot33@lemmy.worldBEnglish · 6 months agoHow Complex Systems Failplus-squarehow.complexsystems.failexternal-linkmessage-square0fedilinkarrow-up12arrow-down11cross-posted to: netsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.world
arrow-up11arrow-down1external-linkHow Complex Systems Failplus-squarehow.complexsystems.failrepostbot33@lemmy.worldBEnglish · 6 months agomessage-square0fedilinkcross-posted to: netsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.worldnetsec@lemmy.world