Innerworld@lemmy.worldEnglish · 18 hours agoGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up12arrow-down13
arrow-up1-1arrow-down1external-linkGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comInnerworld@lemmy.worldEnglish · 18 hours agomessage-square1linkfedilink
codeinabox@programming.devEnglish · 4 days agoMinimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comexternal-linkmessage-square5linkfedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkMinimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comcodeinabox@programming.devEnglish · 4 days agomessage-square5linkfedilink
codeinabox@programming.devEnglish · 3 days agoPackage Security Problems for AI Agentsplus-squarenesbitt.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkPackage Security Problems for AI Agentsplus-squarenesbitt.iocodeinabox@programming.devEnglish · 3 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 4 days agoAssessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comexternal-linkmessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAssessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comcodeinabox@programming.devEnglish · 4 days agomessage-square2linkfedilink
buskill@lemdro.idEnglish · 4 days agoBounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkBounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inbuskill@lemdro.idEnglish · 4 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 7 days agoOpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkOpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comcodeinabox@programming.devEnglish · 7 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 7 days agoStop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.meexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkStop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.mecodeinabox@programming.devEnglish · 7 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 8 days agoDon’t let A.I. read your .env filesplus-squarefiliphric.comexternal-linkmessage-square4linkfedilinkarrow-up118arrow-down14
arrow-up114arrow-down1external-linkDon’t let A.I. read your .env filesplus-squarefiliphric.comcodeinabox@programming.devEnglish · 8 days agomessage-square4linkfedilink
Artwork@lemmy.worldEnglish · 10 days agoAfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.plus-squarelemmy.worldimagemessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1imageAfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.plus-squarelemmy.worldArtwork@lemmy.worldEnglish · 10 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 11 days agoSupply Chain Attack on Axios Pulls Malicious Dependency from npmplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSupply Chain Attack on Axios Pulls Malicious Dependency from npmplus-squaresocket.devcodeinabox@programming.devEnglish · 11 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 14 days agoShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comInnerworld@lemmy.worldEnglish · 14 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 15 days agoHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comInnerworld@lemmy.worldEnglish · 15 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 15 days agoIranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkIranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comInnerworld@lemmy.worldEnglish · 15 days agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 15 days agoTrivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secretsplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTrivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secretsplus-squaresocket.devKissaki@programming.devEnglish · 15 days agomessage-square0linkfedilink
Kissaki@programming.devEnglish · 15 days agoCompromised telnyx on PyPI: WAV Steganography and Credential Theftplus-squaresafedep.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCompromised telnyx on PyPI: WAV Steganography and Credential Theftplus-squaresafedep.ioKissaki@programming.devEnglish · 15 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 15 days agoHackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppersplus-squaresan.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkHackers have exposed more than 8.3 million supposedly confidential reports to tip lines like Crime Stoppersplus-squaresan.comInnerworld@lemmy.worldEnglish · 15 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 16 days agoTeamPCP deploys CanisterWorm on NPM following Trivy compromiseplus-squarewww.aikido.devexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkTeamPCP deploys CanisterWorm on NPM following Trivy compromiseplus-squarewww.aikido.devcodeinabox@programming.devEnglish · 16 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 17 days agoThousands of websites are accidentally broadcasting sensitive dataplus-squaretechxplore.comexternal-linkmessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThousands of websites are accidentally broadcasting sensitive dataplus-squaretechxplore.comInnerworld@lemmy.worldEnglish · 17 days agomessage-square2linkfedilink
Kissaki@programming.devEnglish · 18 days agoDelve - Fake Compliance as a Serviceplus-squaredeepdelver.substack.comexternal-linkmessage-square2linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkDelve - Fake Compliance as a Serviceplus-squaredeepdelver.substack.comKissaki@programming.devEnglish · 18 days agomessage-square2linkfedilink
Innerworld@lemmy.worldEnglish · 19 days agoUS State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversariesplus-squareabcnews.comexternal-linkmessage-square2linkfedilinkarrow-up111arrow-down12
arrow-up19arrow-down1external-linkUS State Department launches the Bureau of Emerging Threats to tackle current and future threats, including cyberattacks and AI weaponization by adversariesplus-squareabcnews.comInnerworld@lemmy.worldEnglish · 19 days agomessage-square2linkfedilink