kerntucky@infosec.pubEnglish · 2 days agoMalicious ML models found on Hugging Face Hubplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious ML models found on Hugging Face Hubplus-squarewww.helpnetsecurity.comkerntucky@infosec.pubEnglish · 2 days agomessage-square0fedilink
Ⓜ3️⃣3️⃣ 🌌@lemmy.sdf.orgEnglish · 2 months agoFYI OpenCVE 2.0 Opensource Vulnerability Management Platform is outplus-squarewww.opencve.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFYI OpenCVE 2.0 Opensource Vulnerability Management Platform is outplus-squarewww.opencve.ioⓂ3️⃣3️⃣ 🌌@lemmy.sdf.orgEnglish · 2 months agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 2 months agoDoes Your Company Need a Virtual CISO?plus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDoes Your Company Need a Virtual CISO?plus-squarewww.darkreading.comsv1sjp@lemmy.worldMEnglish · 2 months agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 3 months agoDORA Is Coming: Are You Ready for the New EU Regulation?plus-squarehubs.laexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDORA Is Coming: Are You Ready for the New EU Regulation?plus-squarehubs.lasv1sjp@lemmy.worldMEnglish · 3 months agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 3 months agoThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comsv1sjp@lemmy.worldMEnglish · 3 months agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 3 months agoDisclosure of 7 Android and Google Pixel Vulnerabilitiesplus-squareblog.oversecured.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDisclosure of 7 Android and Google Pixel Vulnerabilitiesplus-squareblog.oversecured.comsv1sjp@lemmy.worldMEnglish · 3 months agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 3 months agoGPUAF - Two ways of Rooting All Qualcomm based Android phonespowerofcommunity.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGPUAF - Two ways of Rooting All Qualcomm based Android phonespowerofcommunity.netsv1sjp@lemmy.worldMEnglish · 3 months agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 3 months agoHatching - Automated malware analysis solutionsplus-squarehatching.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHatching - Automated malware analysis solutionsplus-squarehatching.iosv1sjp@lemmy.worldMEnglish · 3 months agomessage-square0fedilink