@anon
home
security
create
hot
recent
random
top
post
home
security
create
hot
recent
random
top
@anon
sign up
pull down to refresh
all
posts
comments
freebies
links
discussions
bounties
polls
CrowdStrike Stock Falls Amid Report Government Probing Software Deal
www.investors.com/news/technology/crowdstrike-stock-falls-government-probe-carahsoft/
21 sats
\
0 comments
\
@ch0k1
5h
security
Do You Really Have to Stop Using Windows 10?
www.wired.com/story/do-you-really-have-to-stop-using-windows-10/
45 sats
\
1 comment
\
@ch0k1
8h
security
First Glimpse of the Starlink User Terminal Including Firmware Extract/Analysis
www.darknavy.org/blog/a_first_glimpse_of_the_starlink_user_ternimal/
122 sats
\
0 comments
\
@k00b
9h
security
Reproducible Builds: Verify our Android app builds bit-for-bit
mullvad.net/pt/blog/reproducible-builds-verify-our-android-app-builds-bit-for-bit
10 sats
\
0 comments
\
@jakoyoh629
11h
security
Hackers Weaponized 21 Apps to Gain Full Control of Ecommerce Servers
cybersecuritynews.com/hackers-weaponized-21-apps-to-gain-full-control/
10 sats
\
0 comments
\
@ch0k1
7 May
security
[Parents Corner] How would you set up a hackable safe?
2361 sats
\
14 comments
\
@SimpleStacker
7 May
security
The Signal Clone the Trump Admin Uses Was Hacked
www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/
112 sats
\
3 comments
\
@jakoyoh629
5 May
security
Remote Desktop Attack Let Hackers Exfiltrate Sensitive Data From Organization
cybersecuritynews.com/remote-desktop-puzzle/
106 sats
\
1 comment
\
@ch0k1
3 May
security
Hackers Weaponizing Go Modules to Deliver Disk-Wiping Malware Leads to Data Loss
cybersecuritynews.com/hackers-weaponizing-go-modules/
13 sats
\
0 comments
\
@ch0k1
3 May
security
Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition
cybersecuritynews.com/apache-tomcat-vulnerability-let-bypass-rules/
0 sats
\
0 comments
\
@ch0k1
2 May
security
In Praise of Tor: Why You Should Support and Use Tor
www.privacyguides.org/articles/2025/04/30/in-praise-of-tor/
19 sats
\
2 comments
\
@kepford
2 May
security
A Flaw With the Security Level Slider in Tor Browser
www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/
216 sats
\
10 comments
\
@kepford
2 May
security
ToyMaker Hackers Compromised Multitude Hosts Using SSH & File Transfer Tools
cybersecuritynews.com/toymaker-hackers-compromised-multitude-hosts/
0 sats
\
0 comments
\
@ch0k1
2 May
security
Identified a North Korean hacker who tried to get a job at Kraken
blog.kraken.com/news/how-we-identified-a-north-korean-hacker
283 sats
\
0 comments
\
@Gian
1 May
security
# Una herramienta más para tu kit digital: el gestor de contraseñas.
0 sats
\
0 comments
\
@villawolf
1 May
security
AirBorne: Wormable Zero-Click RCE in Apple AirPlay
www.oligo.security/blog/airborne
33 sats
\
0 comments
\
@k00b
30 Apr
security
I use Zip Bombs to Protect my Server
idiallo.com/blog/zipbomb-protection
676 sats
\
10 comments
\
@k00b
30 Apr
security
Unpatched Windows Shortcut Vulnerability Let Attackers Execute Remote Code
cybersecuritynews.com/windows-shortcut-vulnerability-remote-code/
3 sats
\
1 comment
\
@ch0k1
30 Apr
security
Security Standards and Name Changes in the Browser Wars
tim.dierks.org/2014/05/security-standards-and-name-changes-in.html
285 sats
\
1 comment
\
@ek
30 Apr
security
Solidity
0 sats
\
0 comments
\
@reddystream
30 Apr
security
Lessons learned from a 7+ hours electrical balckout in Spain
3665 sats
\
19 comments
\
@klk
29 Apr
security
more