cyph3rPunk@infosec.pubM • 4 months agonew vulnerability in your motherboardplus-squareexternal-linkmessage-square0 fedilinkarrow-up19
arrow-up19external-linknew vulnerability in your motherboardplus-squarecyph3rPunk@infosec.pubM • 4 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 5 months agoXenoRAT | Malware of the Dayplus-squareexternal-linkmessage-square1 fedilinkarrow-up15
arrow-up15external-linkXenoRAT | Malware of the Dayplus-squarecyph3rPunk@infosec.pubM • 5 months agomessage-square1 Commentsfedilink
BusKill@lemmy.kde.social • 6 months ago3D-Printed USB Dead Man Switch (Prototype Demo)plus-squareexternal-linkmessage-square0 fedilinkarrow-up12
arrow-up12external-link3D-Printed USB Dead Man Switch (Prototype Demo)plus-squareBusKill@lemmy.kde.social • 6 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 6 months agoThe Unbreakable Kryptos Codeplus-squareexternal-linkmessage-square0 fedilinkarrow-up13
arrow-up13external-linkThe Unbreakable Kryptos Codeplus-squarecyph3rPunk@infosec.pubM • 6 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 7 months agoMalicious Backdoor in xz liblzmaplus-squareexternal-linkmessage-square0 fedilinkarrow-up17
arrow-up17external-linkMalicious Backdoor in xz liblzmaplus-squarecyph3rPunk@infosec.pubM • 7 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 7 months agonew linux exploit is absolutely insaneplus-squareexternal-linkmessage-square0 fedilinkarrow-up13
arrow-up13external-linknew linux exploit is absolutely insaneplus-squarecyph3rPunk@infosec.pubM • 7 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 7 months agoBroadcast LoRa packets WITHOUT a radioplus-squareexternal-linkmessage-square0 fedilinkarrow-up117
arrow-up117external-linkBroadcast LoRa packets WITHOUT a radioplus-squarecyph3rPunk@infosec.pubM • 7 months agomessage-square0 Commentsfedilink
SLfgb@feddit.nl • 8 months ago'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squareexternal-linkmessage-square0 fedilinkarrow-up14
arrow-up14external-link'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squareSLfgb@feddit.nl • 8 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • edit-29 months agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareexternal-linkmessage-square0 fedilinkarrow-up116
arrow-up116external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squarecyph3rPunk@infosec.pubM • edit-29 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 9 months agoHow to Start a War With a Flash Drive (31:45)plus-squareexternal-linkmessage-square0 fedilinkarrow-up14
arrow-up14external-linkHow to Start a War With a Flash Drive (31:45)plus-squarecyph3rPunk@infosec.pubM • 9 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 10 months agoAdvanced Meshtastic Seriesplus-squareexternal-linkmessage-square0 fedilinkarrow-up15
arrow-up15external-linkAdvanced Meshtastic Seriesplus-squarecyph3rPunk@infosec.pubM • 10 months agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 1 year agoTrue Random Numbers - Computerphile (12:15)plus-squareexternal-linkmessage-square0 fedilinkarrow-up16
arrow-up16external-linkTrue Random Numbers - Computerphile (12:15)plus-squarecyph3rPunk@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
demesisx@infosec.pub • 1 year agoIntell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology. (arXiv:2311.00240v1 [cs.CR])plus-squareexternal-linkmessage-square0 fedilinkarrow-up16
arrow-up16external-linkIntell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology. (arXiv:2311.00240v1 [cs.CR])plus-squaredemesisx@infosec.pub • 1 year agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 1 year agoDarknet Diaries: True stories from the dark side of the Internetplus-squareexternal-linkmessage-square4 fedilinkarrow-up122
arrow-up122external-linkDarknet Diaries: True stories from the dark side of the Internetplus-squarecyph3rPunk@infosec.pubM • 1 year agomessage-square4 Commentsfedilink
cyph3rPunk@infosec.pubM • 1 year agoHow the Best Hackers Learn Their Craft [42:46]plus-squareexternal-linkmessage-square0 fedilinkarrow-up13
arrow-up13external-linkHow the Best Hackers Learn Their Craft [42:46]plus-squarecyph3rPunk@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
demesisx@infosec.pub • 1 year agoWhy a true privacy tool can’t be built to comply with the State w/ Alan Szepieniecplus-squareexternal-linkmessage-square0 fedilinkarrow-up15
arrow-up15external-linkWhy a true privacy tool can’t be built to comply with the State w/ Alan Szepieniecplus-squaredemesisx@infosec.pub • 1 year agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 1 year agoAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squareexternal-linkmessage-square1 fedilinkarrow-up120
arrow-up120external-linkAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squarecyph3rPunk@infosec.pubM • 1 year agomessage-square1 Commentsfedilink
cyph3rPunk@infosec.pubM • 1 year ago"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)plus-squareexternal-linkmessage-square0 fedilinkarrow-up18
arrow-up18external-link"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)plus-squarecyph3rPunk@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • 1 year agoPublic Key Cryptography - Computerphile (6:19)plus-squareexternal-linkmessage-square0 fedilinkarrow-up13
arrow-up13external-linkPublic Key Cryptography - Computerphile (6:19)plus-squarecyph3rPunk@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
cyph3rPunk@infosec.pubM • edit-21 year agoLet's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08)plus-squareexternal-linkmessage-square0 fedilinkarrow-up16
arrow-up16external-linkLet's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08)plus-squarecyph3rPunk@infosec.pubM • edit-21 year agomessage-square0 Commentsfedilink