codeinaboxEnglish · 22 hours agoDependency cooldowns turn you into a free-riderplus-squarecalpaterson.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkDependency cooldowns turn you into a free-riderplus-squarecalpaterson.comcodeinaboxEnglish · 22 hours agomessage-square0linkfedilink
codeinaboxEnglish · 19 hours agoCybersecurity Looks Like Proof of Work Nowplus-squarewww.dbreunig.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCybersecurity Looks Like Proof of Work Nowplus-squarewww.dbreunig.comcodeinaboxEnglish · 19 hours agomessage-square0linkfedilink
codeinaboxEnglish · 2 days agoOur evaluation of Claude Mythos Preview’s cyber capabilitiesplus-squarewww.aisi.gov.ukexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkOur evaluation of Claude Mythos Preview’s cyber capabilitiesplus-squarewww.aisi.gov.ukcodeinaboxEnglish · 2 days agomessage-square1linkfedilink
codeinaboxEnglish · 2 days agoAI “Watershed Moment” or expensive pen tester? The AISI Mythos Dataplus-squareblog.robbowley.netexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkAI “Watershed Moment” or expensive pen tester? The AISI Mythos Dataplus-squareblog.robbowley.netcodeinaboxEnglish · 2 days agomessage-square0linkfedilink
codeinaboxEnglish · 4 days agoNo one owes you supply-chain securityplus-squarepurplesyringa.moeexternal-linkmessage-square3linkfedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkNo one owes you supply-chain securityplus-squarepurplesyringa.moecodeinaboxEnglish · 4 days agomessage-square3linkfedilink
codeinaboxEnglish · 8 days agoMinimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comexternal-linkmessage-square6linkfedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkMinimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comcodeinaboxEnglish · 8 days agomessage-square6linkfedilink
Innerworld@lemmy.worldEnglish · 5 days agoGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up12arrow-down13
arrow-up1-1arrow-down1external-linkGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comInnerworld@lemmy.worldEnglish · 5 days agomessage-square1linkfedilink
codeinaboxEnglish · 7 days agoPackage Security Problems for AI Agentsplus-squarenesbitt.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkPackage Security Problems for AI Agentsplus-squarenesbitt.iocodeinaboxEnglish · 7 days agomessage-square0linkfedilink
codeinaboxEnglish · 8 days agoAssessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comexternal-linkmessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAssessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comcodeinaboxEnglish · 8 days agomessage-square2linkfedilink
buskill@lemdro.idEnglish · 9 days agoBounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkBounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inbuskill@lemdro.idEnglish · 9 days agomessage-square0linkfedilink
codeinaboxEnglish · 12 days agoOpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkOpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comcodeinaboxEnglish · 12 days agomessage-square0linkfedilink
codeinaboxEnglish · 12 days agoStop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.meexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkStop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.mecodeinaboxEnglish · 12 days agomessage-square0linkfedilink
codeinaboxEnglish · 13 days agoDon’t let A.I. read your .env filesplus-squarefiliphric.comexternal-linkmessage-square4linkfedilinkarrow-up118arrow-down14
arrow-up114arrow-down1external-linkDon’t let A.I. read your .env filesplus-squarefiliphric.comcodeinaboxEnglish · 13 days agomessage-square4linkfedilink
Artwork@lemmy.worldEnglish · 15 days agoAfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.plus-squarelemmy.worldimagemessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1imageAfterPack: Claude Code's Source Didn't Leak. It Was Already Public for Years.plus-squarelemmy.worldArtwork@lemmy.worldEnglish · 15 days agomessage-square0linkfedilink
codeinaboxEnglish · 16 days agoSupply Chain Attack on Axios Pulls Malicious Dependency from npmplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSupply Chain Attack on Axios Pulls Malicious Dependency from npmplus-squaresocket.devcodeinaboxEnglish · 16 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 18 days agoShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkShinyHunters says it stole 350GB+ of data in a cyberattack on the European Commission, detected on March 24; the EC says its internal systems were not affectedplus-squaresecurityaffairs.comInnerworld@lemmy.worldEnglish · 18 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 19 days agoHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wildplus-squarewww.wired.comInnerworld@lemmy.worldEnglish · 19 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 20 days agoIranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkIranian-linked hackers claimed responsibility for the breach of FBI Direct Kash Patel’s personal email accountplus-squarewww.reuters.comInnerworld@lemmy.worldEnglish · 20 days agomessage-square0linkfedilink
KissakiEnglish · 20 days agoTrivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secretsplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTrivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secretsplus-squaresocket.devKissakiEnglish · 20 days agomessage-square0linkfedilink
KissakiEnglish · 20 days agoCompromised telnyx on PyPI: WAV Steganography and Credential Theftplus-squaresafedep.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCompromised telnyx on PyPI: WAV Steganography and Credential Theftplus-squaresafedep.ioKissakiEnglish · 20 days agomessage-square0linkfedilink