Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IL
Posts
130
Comments
585
Joined
2 yr. ago
  • Should we look at the history of all illegal immigrants in the US, keep them from owning property, a job, and residence?

    We follow Trumps lead and start with the departments of the executive branch first.

  • That's a great point.

    Search engines should fix this for federated websites if they still want the best search results.

    For a solution now, I wonder if a 307 (Temporary Redirect) status code, redirecting to the original instance post, could work for search crawlers.

  • The biggest issue of community growth is the lack priority in search engines. If you ask a question on lemmy, stackoverflow, and reddit at the same time, you will get the two latter choices first even if the lemmy post has a better answer.

    Either lemmy is not prioritized because of the age of the domain, or less visitors, but I think it's purposely done. There are usually no ads on lemmy. Google prioritizes sites that use their products.

  • These changes are a good thing.

    Requiring a pin means no one can use your fingerprint or your face to unlock your device.

    An NSA agent recommended restarting your phone every week. This can potentially clear out malware that doesn't have permissions to start after a reboot.

  • for anyone in the US, please freeze your credit for you and anyone else in your family.

    With all these breaches it is mandatory.

    Also driver license numbers just went up in value because of the anti porn states. If you get asked questions about who has your driver license info, keep any notice of any breaches at hand.

  • Security News @infosec.pub
    IllNess @infosec.pub

    Subaru Starlink flaw let hackers hijack cars in US and Canada

    Security researchers have discovered an arbitrary account takeover flaw in Subaru's Starlink service that could let attackers track, control, and hijack vehicles in the United States, Canada, and Japan using just a license plate.

    Curry says Subaru patched the vulnerability within 24 hours of the researchers' report and was never exploited by an attacker.

    Security News @infosec.pub
    IllNess @infosec.pub

    Hackers use Windows RID hijacking to create hidden admin account

    A North Korean threat group has been using a technique called RID hijacking that tricks Windows into treating a low-privileged account as one with administrator permissions.

    Security News @infosec.pub
    IllNess @infosec.pub

    Hacker infects 18,000 "script kiddies" with fake malware builder

    The CloudSEK researchers disrupted the botnet by utilizing hard-coded API tokens and a built-in kill switch to uninstall the malware from infected devices.

    Security News @infosec.pub
    IllNess @infosec.pub

    Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025

    Security News @infosec.pub
    IllNess @infosec.pub

    Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

    Security News @infosec.pub
    IllNess @infosec.pub

    Fake Homebrew Google ads target Mac users with malware

    "Mac Homebrew Project Leader here. This seems taken down now," tweeted McQuaid.

    Security News @infosec.pub
    IllNess @infosec.pub

    Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei Routers

    To safeguard against such attacks, it's advised to monitor suspicious processes, events, and network traffic spawned by the execution of any untrusted binary/scripts. It's also recommended to apply firmware updates and change the default username and password.

    Security News @infosec.pub
    IllNess @infosec.pub

    13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

    Security News @infosec.pub
    IllNess @infosec.pub

    Malicious PyPi package steals Discord auth tokens from devs

    A malicious package named 'pycord-self' on the Python package index (PyPI) targets Discord developers to steal authentication tokens and plant a backdoor for remote control over the system.

    Security News @infosec.pub
    IllNess @infosec.pub

    Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation

    Security News @infosec.pub
    IllNess @infosec.pub

    New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

    Security News @infosec.pub
    IllNess @infosec.pub

    CISA and US and International Partners Publish Guidance for OT Owners and Operators

    Security News @infosec.pub
    IllNess @infosec.pub
    Security News @infosec.pub
    IllNess @infosec.pub

    Apple Bug Allows Security Bypass Without Physical Access

    cross-posted from: https://lemmy.zip/post/30049292

    Emergent macOS vulnerability lets adversaries circumvent Apple's System Integrity Protection (SIP) by loading third-party kernels.

    Security News @infosec.pub
    IllNess @infosec.pub

    Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

    New research has pulled back the curtain on a "deficiency" in Google's "Sign in with Google" authentication flow that exploits a quirk in domain ownership to gain access to sensitive data.

    Security News @infosec.pub
    IllNess @infosec.pub

    Biden White House to go all out in final, sweeping cybersecurity order

    The ambitious final executive order requires 52 agency actions to bolster cyber protections and counter adversaries, including a new plan to address spiraling digital identity theft.

    Security News @infosec.pub
    IllNess @infosec.pub
    Security News @infosec.pub
    IllNess @infosec.pub

    CISA Plan Aligns Cybersecurity Across Federal Agencies

    Security News @infosec.pub
    IllNess @infosec.pub

    Global infostealer malware operation targets crypto users, gamers

    The threat actors use a variety of distribution channels, including malvertising, spearphishing, and brand impersonation in online gaming, cryptocurrency, and software, to spread 50 malware payloads, including AMOS, Stealc, and Rhadamanthys.

    Victims are lured into downloading malicious software by interacting with what they are tricked into believing are legitimate job opportunities or project collaborations.

    On Windows, HijackLoader is used for delivering Stealc, a general-purpose lightweight info-stealer designed to collect data from browsers and crypto wallet apps, or Rhadamanthys, a more specialized stealer that targets a broad range of applications and data types.

    When the target uses macOS, Marko Polo deploys Atomic ('AMOS'). This stealer launched in mid-2023, rented to cybercriminals for $1,000/month, allowing them to snatch various data stored in web browsers.

    Security News @infosec.pub
    IllNess @infosec.pub