Arthur Besse@lemmy.mlEnglish · edit-22 months agoLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkLinux Kernel CVEs, What Has Caused So Many to Suddenly Show Up? - talk by Greg Kroah-Hartman (August 2024)plus-squarewww.youtube.comArthur Besse@lemmy.mlEnglish · edit-22 months agomessage-square0fedilink
Cedric@lemmy.ml · 2 months agoVulnerability Lookup 1.5.0plus-squarelemmy.mlimagemessage-square0fedilinkarrow-up11
arrow-up11imageVulnerability Lookup 1.5.0plus-squarelemmy.mlCedric@lemmy.ml · 2 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 3 months ago"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-link"we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX"plus-squarexcancel.comArthur Besse@lemmy.mlEnglish · 3 months agomessage-square0fedilink
wihkum@lemmy.todayEnglish · 3 months agoWihkum - Emergency Response App for Schools in 2024plus-squarewihkum.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkWihkum - Emergency Response App for Schools in 2024plus-squarewihkum.comwihkum@lemmy.todayEnglish · 3 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoONNX Bot Tool Hijacks Microsoft 365 accounts & Even Bypass 2FAplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkONNX Bot Tool Hijacks Microsoft 365 accounts & Even Bypass 2FAplus-squarecybersecuritynews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agoiVerify found stock Google Pixel devices' app "showcase" With Excessive System Privileges, Including Remote Code Executionplus-squareiverify.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkiVerify found stock Google Pixel devices' app "showcase" With Excessive System Privileges, Including Remote Code Executionplus-squareiverify.io☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months ago0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devicesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-link0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devicesplus-squarethehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 3 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agoRansomware operators exploit ESXi hypervisor vulnerability for mass encryptionplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkRansomware operators exploit ESXi hypervisor vulnerability for mass encryptionplus-squarewww.microsoft.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agoSignal downplays encryption key flaw, fixes it after X dramaplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSignal downplays encryption key flaw, fixes it after X dramaplus-squarewww.bleepingcomputer.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agomessage-square0fedilink
Cedric@lemmy.ml · 4 months agoVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkVulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.plus-squaregithub.comCedric@lemmy.ml · 4 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agoCVE-2024-6409: OpenSSH: Possible remote code execution in privsep childplus-squarewww.openwall.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCVE-2024-6409: OpenSSH: Possible remote code execution in privsep childplus-squarewww.openwall.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 4 months agomessage-square0fedilink
hetzlemmingsworld@lemmings.world · edit-25 months agoHow to avoid phishing fraud scamplus-squaremessage-squaremessage-square0fedilinkarrow-up11
arrow-up11message-squareHow to avoid phishing fraud scamplus-squarehetzlemmingsworld@lemmings.world · edit-25 months agomessage-square0fedilink
Arthur Besse@lemmy.mlEnglish · 5 months agoFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkFirmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save youplus-squarewww.tomshardware.comArthur Besse@lemmy.mlEnglish · 5 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 months agoNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkNew Wi-Fi Takeover Attack—All Windows Users Warned To Update Nowplus-squarewww.forbes.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 months agomessage-square0fedilink
BusKill@lemmy.kde.social · 5 months agoBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkBusKill Warrant Canary for 2024 H2 🕵️plus-squarewww.buskill.inBusKill@lemmy.kde.social · 5 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 months agoThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkThe iPhone Setting Thieves Use to Lock You Out of Your Apple Accountplus-squarewww.wsj.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 months agomessage-square0fedilink
lemmyreader@lemmy.mlEnglish · 5 months agoHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHacking Millions of Modems (and Investigating Who Hacked My Modem)plus-squaresamcurry.netlemmyreader@lemmy.mlEnglish · 5 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agoStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.plus-squaredoublepulsar.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkStealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.plus-squaredoublepulsar.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agomessage-square0fedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agoFederal agency warns critical Linux vulnerability being actively exploitedplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkFederal agency warns critical Linux vulnerability being actively exploitedplus-squarearstechnica.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 6 months agomessage-square0fedilink
rando895@lemmygrad.ml · 6 months agoSecuring a computer?plus-squaremessage-squaremessage-square0fedilinkarrow-up11
arrow-up11message-squareSecuring a computer?plus-squarerando895@lemmygrad.ml · 6 months agomessage-square0fedilink