Jimmycrackcrack@lemmy.ml · edit-21 year agoto what extent does obscurity mitigate risk?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareto what extent does obscurity mitigate risk?plus-squareJimmycrackcrack@lemmy.ml · edit-21 year agomessage-square0fedilink
zHenta7@lemmy.mlEnglish · edit-21 year agoHOW DO I GET INTO CYBERSECURITY?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHOW DO I GET INTO CYBERSECURITY?plus-squarezHenta7@lemmy.mlEnglish · edit-21 year agomessage-square0fedilink
Sparkega@lemmy.worldEnglish · 1 year agoHacker Archetypes - D&D Classesplus-squarewww.gosecure.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacker Archetypes - D&D Classesplus-squarewww.gosecure.netSparkega@lemmy.worldEnglish · 1 year agomessage-square0fedilink
PitzNR@lemmy.world · 1 year agoFound something abnormal(?)plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareFound something abnormal(?)plus-squarePitzNR@lemmy.world · 1 year agomessage-square0fedilink
LittlePrimate@feddit.deEnglish · 1 year agoHumble "Cybersecurity Zero to Hero" Bundleplus-squarewww.humblebundle.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHumble "Cybersecurity Zero to Hero" Bundleplus-squarewww.humblebundle.comLittlePrimate@feddit.deEnglish · 1 year agomessage-square0fedilink
Admiral Patrick@dubvee.orgEnglish · 1 year agoTorrent of image-based phishing emails are harder to detect and more convincingplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTorrent of image-based phishing emails are harder to detect and more convincingplus-squarearstechnica.comAdmiral Patrick@dubvee.orgEnglish · 1 year agomessage-square0fedilink
Screak42@lemmy.ml · 1 year agoHackerangriff auf externen BARMER-Dienstleister – Mögliches Schadensausmaß wird geprüftplus-squarewww.barmer.deexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackerangriff auf externen BARMER-Dienstleister – Mögliches Schadensausmaß wird geprüftplus-squarewww.barmer.deScreak42@lemmy.ml · 1 year agomessage-square0fedilink
TribesmanJohn@beehaw.orgEnglish · 1 year agoReddit hackers threaten to leak data stolen in February breach - BlackCat Ransomwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReddit hackers threaten to leak data stolen in February breach - BlackCat Ransomwareplus-squarewww.bleepingcomputer.comTribesmanJohn@beehaw.orgEnglish · 1 year agomessage-square0fedilink
Taos@lemmy.mlEnglish · 1 year agoMicrosoft’s Azure portal down following new claims of DDoS attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft’s Azure portal down following new claims of DDoS attacksplus-squarewww.bleepingcomputer.comTaos@lemmy.mlEnglish · 1 year agomessage-square0fedilink
bears@lemmy.world · 1 year agoHelp me understand this Azure / DNS attackplus-squarewww.keytos.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHelp me understand this Azure / DNS attackplus-squarewww.keytos.iobears@lemmy.world · 1 year agomessage-square0fedilink
JoYo@lemmy.mlEnglish · 1 year agonot surprising, the DMV sells a lot of informationplus-squaremastodon.socialexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknot surprising, the DMV sells a lot of informationplus-squaremastodon.socialJoYo@lemmy.mlEnglish · 1 year agomessage-square0fedilink
itchy_lizard@feddit.it · edit-21 year agoAttackers use Deepfake of "Kidnapped" Daughter, Demand Ransomplus-squarewww.theguardian.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttackers use Deepfake of "Kidnapped" Daughter, Demand Ransomplus-squarewww.theguardian.comitchy_lizard@feddit.it · edit-21 year agomessage-square0fedilink
Wilshire@beehaw.orgEnglish · 1 year agoU.S. government says several agencies hacked as part of broader cyberattackplus-squarewww.cnbc.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkU.S. government says several agencies hacked as part of broader cyberattackplus-squarewww.cnbc.comWilshire@beehaw.orgEnglish · 1 year agomessage-square0fedilink
tripple@beehaw.org · 1 year agoImproving HTTPS on private networksplus-squarealexsci.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImproving HTTPS on private networksplus-squarealexsci.comtripple@beehaw.org · 1 year agomessage-square0fedilink
seirim@lemmy.ml · 1 year agoBarracuda says hacked ESG appliances must be replaced immediatelyplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBarracuda says hacked ESG appliances must be replaced immediatelyplus-squarewww.bleepingcomputer.comseirim@lemmy.ml · 1 year agomessage-square0fedilink
TribesmanJohn@beehaw.orgEnglish · 1 year agoClop ransomware gang claims the hack of hundreds of victimsplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClop ransomware gang claims the hack of hundreds of victimsplus-squaresecurityaffairs.comTribesmanJohn@beehaw.orgEnglish · 1 year agomessage-square0fedilink
Wilshire@beehaw.orgEnglish · 1 year agoChatGPT creates mutating malware that evades detection by EDRplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChatGPT creates mutating malware that evades detection by EDRplus-squarewww.csoonline.comWilshire@beehaw.orgEnglish · 1 year agomessage-square0fedilink
seirim@lemmy.ml · 1 year agoTop Topics for Small Business Owners to focus on for their Cybersecurityplus-squareseirim.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTop Topics for Small Business Owners to focus on for their Cybersecurityplus-squareseirim.comseirim@lemmy.ml · 1 year agomessage-square0fedilink
replicant@lemmy.mlEnglish · 1 year agoNew macOS vulnerability, Migraine, could bypass System Integrity Protectionplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew macOS vulnerability, Migraine, could bypass System Integrity Protectionplus-squarewww.microsoft.comreplicant@lemmy.mlEnglish · 1 year agomessage-square0fedilink
JoYo@lemmy.ml · 1 year agofree virtual hacker conference tomorrow 11:00 EDTplus-squaregrimmcyber.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkfree virtual hacker conference tomorrow 11:00 EDTplus-squaregrimmcyber.comJoYo@lemmy.ml · 1 year agomessage-square0fedilink