L4sBot@lemmy.worldB · 1 year ago4 of the top 10 password strength tools are giving people bad password advice, and they don't care.plus-squareprojectblack.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link4 of the top 10 password strength tools are giving people bad password advice, and they don't care.plus-squareprojectblack.ioL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoA Touch of Pwn: Attacking Windows Hello Fingerprint Authenticationplus-squareblackwinghq.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Touch of Pwn: Attacking Windows Hello Fingerprint Authenticationplus-squareblackwinghq.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoThe Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secretsplus-squareblog.aquasec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secretsplus-squareblog.aquasec.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoOMGCICD - Attacking GitLab CI/CD via Shared Runnersplus-squarepulsesecurity.co.nzexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOMGCICD - Attacking GitLab CI/CD via Shared Runnersplus-squarepulsesecurity.co.nzL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoEnriched Trivy database with Vulners data released and free for allplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEnriched Trivy database with Vulners data released and free for allplus-squaregithub.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoVisual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)plus-squarewww.sonarsource.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVisual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)plus-squarewww.sonarsource.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoDIALStranger: my research about DIAL protocol vulnerabilities is public after 4 yearsplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDIALStranger: my research about DIAL protocol vulnerabilities is public after 4 yearsplus-squaregithub.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoCrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chainplus-squareconvergetp.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chainplus-squareconvergetp.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoRansomware group breaches company, reports them to SEC for failure to discloseplus-squarewww.databreaches.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRansomware group breaches company, reports them to SEC for failure to discloseplus-squarewww.databreaches.netL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoReptar: an Intel Ice Lake CPU vulnerability, by Tavis Ormandyplus-squarelock.cmpxchg8b.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReptar: an Intel Ice Lake CPU vulnerability, by Tavis Ormandyplus-squarelock.cmpxchg8b.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoNothing new, still broken, insecure by default since then: Python's e-mail libraries and certificate verification and how it affected open source projectsplus-squarewww.pentagrid.chexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNothing new, still broken, insecure by default since then: Python's e-mail libraries and certificate verification and how it affected open source projectsplus-squarewww.pentagrid.chL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoCVE Watcher: Hunting Down CVEs Before the Patch Dropsplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE Watcher: Hunting Down CVEs Before the Patch Dropsplus-squaregithub.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoOne shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerabilityplus-squarekaist-hacking.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOne shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerabilityplus-squarekaist-hacking.github.ioL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoBlueNoroff strikes again with new macOS malwareplus-squarewww.jamf.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlueNoroff strikes again with new macOS malwareplus-squarewww.jamf.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoAOL's 92M records database leak in 2003 - A Retroactive Examinationplus-squareg.livejournal.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAOL's 92M records database leak in 2003 - A Retroactive Examinationplus-squareg.livejournal.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoAWS IoT Core: A Compromised Device Perspectiveplus-squareseanpesce.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAWS IoT Core: A Compromised Device Perspectiveplus-squareseanpesce.github.ioL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoSend Bluetooth LE Spam impersonating 219 devices just using Android app instead of Flipper Zeroplus-squarewww.mobile-hacker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSend Bluetooth LE Spam impersonating 219 devices just using Android app instead of Flipper Zeroplus-squarewww.mobile-hacker.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year ago50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability Disclosuresplus-squareblog.aquasec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link50 Shades of Vulnerabilities: Uncovering Flaws in Open-Source Vulnerability Disclosuresplus-squareblog.aquasec.comL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoWhen a vulnerability disclosure doesn't go how you expect.plus-squareprojectblack.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen a vulnerability disclosure doesn't go how you expect.plus-squareprojectblack.ioL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink
L4sBot@lemmy.worldB · 1 year agoYour printer is not your printer ! - Hacking Printers at Pwn2Own Part II | DEVCORE 戴夫寇爾plus-squaredevco.reexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkYour printer is not your printer ! - Hacking Printers at Pwn2Own Part II | DEVCORE 戴夫寇爾plus-squaredevco.reL4sBot@lemmy.worldB · 1 year agomessage-square0fedilink