L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoGhidra training classes from NSAplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGhidra training classes from NSAplus-squaregithub.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoAn intro to automated evasion and compilation of .NET offensive toolsplus-squaretierzerosecurity.co.nzexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn intro to automated evasion and compilation of .NET offensive toolsplus-squaretierzerosecurity.co.nzL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoPhrack #71: Call For Paperplus-squarewww.phrack.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhrack #71: Call For Paperplus-squarewww.phrack.orgL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoHacking Terraform state to gain code execution and privilege escalationplus-squareblog.plerion.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking Terraform state to gain code execution and privilege escalationplus-squareblog.plerion.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoData Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoorplus-squarejfrog.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkData Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoorplus-squarejfrog.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoNew Server Side Prototype Pollution Gadgets Scanner from Doyensecplus-squareblog.doyensec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Server Side Prototype Pollution Gadgets Scanner from Doyensecplus-squareblog.doyensec.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoIt's now possible to find the AWS Account ID for any S3 Bucket (private or public)plus-squaretracebit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIt's now possible to find the AWS Account ID for any S3 Bucket (private or public)plus-squaretracebit.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months ago“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emailsplus-squarelabs.guard.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emailsplus-squarelabs.guard.ioL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 4 months agoChemotherapy method uses patient's own cells as trojan horse to direct cancer-killing drugs to tumorsplus-squaremedicalxpress.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkChemotherapy method uses patient's own cells as trojan horse to direct cancer-killing drugs to tumorsplus-squaremedicalxpress.comL4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoSEO Poisoning to Domain Control: The Gootloader Saga Continuesplus-squarethedfirreport.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSEO Poisoning to Domain Control: The Gootloader Saga Continuesplus-squarethedfirreport.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoCode injection or backdoor: A new look at Ivanti's CVE-2021-44529plus-squarewww.labs.greynoise.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCode injection or backdoor: A new look at Ivanti's CVE-2021-44529plus-squarewww.labs.greynoise.ioL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoPython Risk Identification Tool for generative AI (PyRIT)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPython Risk Identification Tool for generative AI (PyRIT)plus-squaregithub.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoNew TP-Link authentication Bypass!plus-squaressd-disclosure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew TP-Link authentication Bypass!plus-squaressd-disclosure.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoOptum / Change Healthcare Breachplus-squarestatus.changehealthcare.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOptum / Change Healthcare Breachplus-squarestatus.changehealthcare.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOngoing Malware Laced Developer Job Interviewsplus-squareblog.phylum.ioL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoLockbit Ransomeware global taketownplus-squarewww.itnews.com.auexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLockbit Ransomeware global taketownplus-squarewww.itnews.com.auL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoGitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPFplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPFplus-squaregithub.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoIvanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXEplus-squareblog.securelayer7.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXEplus-squareblog.securelayer7.netL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agoAnalysis of Mirai variant leveraging CVE-2023-1389plus-squareblog.permafrostsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of Mirai variant leveraging CVE-2023-1389plus-squareblog.permafrostsec.comL4sBot@lemmy.worldB to Security Operations@lemmy.world · 4 months agomessage-square0fedilink
L4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 4 months agoAmazon — like SpaceX — is the latest company to claim the U.S. labor board is unconstitutional, after receiving numerous labor complaints from employeesplus-squarewww.theverge.comexternal-linkmessage-square2fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkAmazon — like SpaceX — is the latest company to claim the U.S. labor board is unconstitutional, after receiving numerous labor complaints from employeesplus-squarewww.theverge.comL4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 4 months agomessage-square2fedilink