cm0002@lemmings.world · 2 days agoFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsedition.cnn.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsedition.cnn.comcm0002@lemmings.world · 2 days agomessage-square0fedilink
cm0002@lemmings.world · 3 days agoGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comexternal-linkmessage-square1fedilinkarrow-up149arrow-down12
arrow-up147arrow-down1external-linkGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comcm0002@lemmings.world · 3 days agomessage-square1fedilink
shellsharks@infosec.pubM · 2 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 2 days agomessage-square0fedilink
cm0002@lemmings.world · 3 days agoI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workexternal-linkmessage-square0fedilinkarrow-up18arrow-down13
arrow-up15arrow-down1external-linkI Wrote a Book About AI Sycophancy. I Didn’t Use AI to Write It.plus-squarednsk.workcm0002@lemmings.world · 3 days agomessage-square0fedilink
shellsharks@infosec.pubM · 4 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 4 days agomessage-square0fedilink
cm0002@lemmings.world · 6 days agoNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comexternal-linkmessage-square2fedilinkarrow-up131arrow-down11
arrow-up130arrow-down1external-linkNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comcm0002@lemmings.world · 6 days agomessage-square2fedilink
cm0002@lemmings.world · 6 days agohackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkhackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.iocm0002@lemmings.world · 6 days agomessage-square0fedilink
cm0002@lemmings.world · 6 days agoVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgcm0002@lemmings.world · 6 days agomessage-square0fedilink
shellsharks@infosec.pubM · 6 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 6 days agomessage-square0fedilink
Valnao@sh.itjust.works · 10 days agoHow Russia is intercepting communications from European satellitesplus-squaretheconversation.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-linkHow Russia is intercepting communications from European satellitesplus-squaretheconversation.comValnao@sh.itjust.works · 10 days agomessage-square0fedilink
cm0002@infosec.pub · 11 days agoFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comexternal-linkmessage-square1fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comcm0002@infosec.pub · 11 days agomessage-square1fedilink
Innerworld@lemmy.world · 11 days agoGoogle disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theftplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkGoogle disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theftplus-squarewww.reuters.comInnerworld@lemmy.world · 11 days agomessage-square0fedilink
Innerworld@lemmy.world · 11 days agoUnknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026plus-squarewww.bloomberg.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkUnknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026plus-squarewww.bloomberg.comInnerworld@lemmy.world · 11 days agomessage-square0fedilink
shellsharks@infosec.pubM · 11 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 11 days agomessage-square1fedilink
cm0002@lemy.lol · 13 days agoAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comcm0002@lemy.lol · 13 days agomessage-square0fedilink
shellsharks@infosec.pubM · 13 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 13 days agomessage-square0fedilink
cm0002@lemy.lol · 14 days agoWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down13
arrow-up118arrow-down1external-linkWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.comcm0002@lemy.lol · 14 days agomessage-square0fedilink
cm0002@toast.ooo · 16 days agoWhat is OAuth?plus-squareleaflet.pubexternal-linkmessage-square2fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWhat is OAuth?plus-squareleaflet.pubcm0002@toast.ooo · 16 days agomessage-square2fedilink
Innerworld@lemmy.world · 16 days agoFrance's Ministry of Economy disclosed that attackers used stolen official credentials to access FICOBA, the national bank account registry, exposing data on 1.2 million accountsplus-squarewww.securityweek.comexternal-linkmessage-square1fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkFrance's Ministry of Economy disclosed that attackers used stolen official credentials to access FICOBA, the national bank account registry, exposing data on 1.2 million accountsplus-squarewww.securityweek.comInnerworld@lemmy.world · 16 days agomessage-square1fedilink
shellsharks@infosec.pubM · 16 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 16 days agomessage-square0fedilink