Ritsu4LifeEnglish · 2 months agoHow do I learn Cybersecurityplus-squaremessage-squaremessage-square3linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1message-squareHow do I learn Cybersecurityplus-squareRitsu4LifeEnglish · 2 months agomessage-square3linkfedilink
floofloof@lemmy.caEnglish · 4 months agoLawsuit says Clorox hackers got passwords simply by askingplus-squarewww.nbcnews.comexternal-linkmessage-square2linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkLawsuit says Clorox hackers got passwords simply by askingplus-squarewww.nbcnews.comfloofloof@lemmy.caEnglish · 4 months agomessage-square2linkfedilink
floofloof@lemmy.caEnglish · 7 months agoCybersecurity World On Edge As CVE Program Prepares To Go Darkplus-squareflip.itexternal-linkmessage-square2linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkCybersecurity World On Edge As CVE Program Prepares To Go Darkplus-squareflip.itfloofloof@lemmy.caEnglish · 7 months agomessage-square2linkfedilink
maltfield@lemmy.caEnglish · 7 months agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up17arrow-down14
arrow-up13arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@lemmy.caEnglish · 7 months agomessage-square0linkfedilink
redditsucksdoughnutsEnglish · 2 years agoUK police bust worldwide million-dollar crime-as-a-service hub LabHost | TechFinitiveplus-squarewww.techfinitive.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkUK police bust worldwide million-dollar crime-as-a-service hub LabHost | TechFinitiveplus-squarewww.techfinitive.comredditsucksdoughnutsEnglish · 2 years agomessage-square0linkfedilink
punkcoderEnglish · 2 years agoLogging: The Unsung Hero in Developer Security - Here's Why and Howplus-squarewww.withstandsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkLogging: The Unsung Hero in Developer Security - Here's Why and Howplus-squarewww.withstandsecurity.compunkcoderEnglish · 2 years agomessage-square0linkfedilink
punkcoderEnglish · 2 years agoDeveloper Security Software Composition Analysis — Withstand Securityplus-squarewww.withstandsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkDeveloper Security Software Composition Analysis — Withstand Securityplus-squarewww.withstandsecurity.compunkcoderEnglish · 2 years agomessage-square0linkfedilink
Agility0971English · 2 years agoThought experiment on legitimizing hackingplus-squaremessage-squaremessage-square4linkfedilinkarrow-up11arrow-down14
arrow-up1-3arrow-down1message-squareThought experiment on legitimizing hackingplus-squareAgility0971English · 2 years agomessage-square4linkfedilink
comcreatorEnglish · 2 years agoEncryption Communityplus-squareexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down14
arrow-up1-3arrow-down1external-linkEncryption Communityplus-squarecomcreatorEnglish · 2 years agomessage-square0linkfedilink