lettruthout@lemmy.worldEnglish · edit-27 months agoIs this come kind of hack attempt?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareIs this come kind of hack attempt?plus-squarelettruthout@lemmy.worldEnglish · edit-27 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoGhidra training classes from NSAplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGhidra training classes from NSAplus-squaregithub.comL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoAn intro to automated evasion and compilation of .NET offensive toolsplus-squaretierzerosecurity.co.nzexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn intro to automated evasion and compilation of .NET offensive toolsplus-squaretierzerosecurity.co.nzL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoPhrack #71: Call For Paperplus-squarewww.phrack.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhrack #71: Call For Paperplus-squarewww.phrack.orgL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
wizardbeard@lemmy.dbzer0.comEnglish · 8 months agoNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govwizardbeard@lemmy.dbzer0.comEnglish · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoHacking Terraform state to gain code execution and privilege escalationplus-squareblog.plerion.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking Terraform state to gain code execution and privilege escalationplus-squareblog.plerion.comL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoData Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoorplus-squarejfrog.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkData Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoorplus-squarejfrog.comL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 8 months agoNew Server Side Prototype Pollution Gadgets Scanner from Doyensecplus-squareblog.doyensec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Server Side Prototype Pollution Gadgets Scanner from Doyensecplus-squareblog.doyensec.comL4sBot@lemmy.worldB · 8 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoIt's now possible to find the AWS Account ID for any S3 Bucket (private or public)plus-squaretracebit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIt's now possible to find the AWS Account ID for any S3 Bucket (private or public)plus-squaretracebit.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months ago“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emailsplus-squarelabs.guard.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emailsplus-squarelabs.guard.ioL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoSEO Poisoning to Domain Control: The Gootloader Saga Continuesplus-squarethedfirreport.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSEO Poisoning to Domain Control: The Gootloader Saga Continuesplus-squarethedfirreport.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoCode injection or backdoor: A new look at Ivanti's CVE-2021-44529plus-squarewww.labs.greynoise.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCode injection or backdoor: A new look at Ivanti's CVE-2021-44529plus-squarewww.labs.greynoise.ioL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoPython Risk Identification Tool for generative AI (PyRIT)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPython Risk Identification Tool for generative AI (PyRIT)plus-squaregithub.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoNew TP-Link authentication Bypass!plus-squaressd-disclosure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew TP-Link authentication Bypass!plus-squaressd-disclosure.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoOptum / Change Healthcare Breachplus-squarestatus.changehealthcare.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOptum / Change Healthcare Breachplus-squarestatus.changehealthcare.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.ioL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoLockbit Ransomeware global taketownplus-squarewww.itnews.com.auexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLockbit Ransomeware global taketownplus-squarewww.itnews.com.auL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoGitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPFplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPFplus-squaregithub.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoIvanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXEplus-squareblog.securelayer7.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXEplus-squareblog.securelayer7.netL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink
L4sBot@lemmy.worldB · 9 months agoAnalysis of Mirai variant leveraging CVE-2023-1389plus-squareblog.permafrostsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of Mirai variant leveraging CVE-2023-1389plus-squareblog.permafrostsec.comL4sBot@lemmy.worldB · 9 months agomessage-square0fedilink