cm0002@infosec.pub · 3 hours agoA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgcm0002@infosec.pub · 3 hours agomessage-square0linkfedilink
cm0002@suppo.fi · 20 hours agoVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgcm0002@suppo.fi · 20 hours agomessage-square0linkfedilink
Tony Bark@pawb.social · 23 hours agoUniversity of Hawaii Cancer Center hit by ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkUniversity of Hawaii Cancer Center hit by ransomware attackplus-squarewww.bleepingcomputer.comTony Bark@pawb.social · 23 hours agomessage-square0linkfedilink
Sepia@mander.xyz · 3 days agoCyberwarfare: China-Linked UAT-7290 usually active in South Asia expands its espionage-focused intrusions into Southeastern Europe, targeting telecomsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCyberwarfare: China-Linked UAT-7290 usually active in South Asia expands its espionage-focused intrusions into Southeastern Europe, targeting telecomsplus-squarethehackernews.comSepia@mander.xyz · 3 days agomessage-square0linkfedilink
cm0002@literature.cafe · 6 days agoChina hacked email systems of US congressional committee staffplus-squarewww.ft.comexternal-linkmessage-square0linkfedilinkarrow-up160arrow-down11
arrow-up159arrow-down1external-linkChina hacked email systems of US congressional committee staffplus-squarewww.ft.comcm0002@literature.cafe · 6 days agomessage-square0linkfedilink
cm0002@toast.ooo · 5 days agoNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comcm0002@toast.ooo · 5 days agomessage-square0linkfedilink
cm0002@literature.cafe · 5 days agoDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comcm0002@literature.cafe · 5 days agomessage-square0linkfedilink
cm0002@literature.cafe · 7 days ago"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-link"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.decm0002@literature.cafe · 7 days agomessage-square0linkfedilink
cm0002@literature.cafe · 7 days agoBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.deexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.decm0002@literature.cafe · 7 days agomessage-square1linkfedilink
Hotznplotzn@lemmy.sdf.org · 7 days agoTaiwan says Chinese cyber attacks on critical infrastructure are up 113% daily since 2023plus-squareindustrialcyber.coexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkTaiwan says Chinese cyber attacks on critical infrastructure are up 113% daily since 2023plus-squareindustrialcyber.coHotznplotzn@lemmy.sdf.org · 7 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 9 days agoChina-linked Salt Typhoon hackers ‘almost certainly’ in Australia and New Zealand’s critical infrastructureplus-squarewww.smh.com.auexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkChina-linked Salt Typhoon hackers ‘almost certainly’ in Australia and New Zealand’s critical infrastructureplus-squarewww.smh.com.auHotznplotzn@lemmy.sdf.org · 9 days agomessage-square0linkfedilink
cm0002@lemdro.id · 10 days agoThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.comcm0002@lemdro.id · 10 days agomessage-square0linkfedilink
noumenon@lemmy.world · 11 days agoThe Attacks That Defined 2025plus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-linkThe Attacks That Defined 2025plus-squarearstechnica.comnoumenon@lemmy.world · 11 days agomessage-square0linkfedilink
noumenon@lemmy.world · 13 days agoTrump Administration Removes Three Spyware-Linked Execs From Sanctions Listplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up142arrow-down10
arrow-up142arrow-down1external-linkTrump Administration Removes Three Spyware-Linked Execs From Sanctions Listplus-squarewww.reuters.comnoumenon@lemmy.world · 13 days agomessage-square0linkfedilink
noumenon@lemmy.world · 13 days agoDarkSpectre Hackers Spread Malware To 8.8 Million Chrome, Edge, and Firefox Usersplus-squarecyberpress.orgexternal-linkmessage-square0linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkDarkSpectre Hackers Spread Malware To 8.8 Million Chrome, Edge, and Firefox Usersplus-squarecyberpress.orgnoumenon@lemmy.world · 13 days agomessage-square0linkfedilink
Tony Bark@pawb.social · 17 days agoNPM package with 56,000 downloads compromises WhatsApp accountsplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkNPM package with 56,000 downloads compromises WhatsApp accountsplus-squaresecurityaffairs.comTony Bark@pawb.social · 17 days agomessage-square0linkfedilink
cm0002@mander.xyz · 20 days agoWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgexternal-linkmessage-square5linkfedilinkarrow-up119arrow-down13
arrow-up116arrow-down1external-linkWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgcm0002@mander.xyz · 20 days agomessage-square5linkfedilink
Onno (VK6FLAB)@lemmy.radio · 24 days agoPrimary time scale failure at NIST Boulder campus; significant impact on NTP servicesplus-squaregroups.google.comexternal-linkmessage-square2linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkPrimary time scale failure at NIST Boulder campus; significant impact on NTP servicesplus-squaregroups.google.comOnno (VK6FLAB)@lemmy.radio · 24 days agomessage-square2linkfedilink
cm0002@no.lastname.nz · 24 days agoNorth Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true locationplus-squarewww.tomshardware.comexternal-linkmessage-square0linkfedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkNorth Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true locationplus-squarewww.tomshardware.comcm0002@no.lastname.nz · 24 days agomessage-square0linkfedilink
tardigrade@scribe.disroot.org · 24 days agoChina-linked hackers exploit insecure setting in Cisco security productsplus-squarewww.cybersecuritydive.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkChina-linked hackers exploit insecure setting in Cisco security productsplus-squarewww.cybersecuritydive.comtardigrade@scribe.disroot.org · 24 days agomessage-square0linkfedilink