Skip Navigation
Posts
1
Comments
3
Joined
2 mo. ago
  • This applies to all devices and is not specific to Apple, as long as you don't audit and comprehend every piece of software involved.

  • Cybersecurity @sh.itjust.works
    vf2000 @lemmy.zip

    EUVD: Vulnerability Database operated by ENISA (beta)

    the EUVD comes with a holistic approach and aims for ensuring a high level of interconnection of information sources. It does so by leveraging the open-source software Vulnerability-Lookup which enables a quick correlation of vulnerabilities from multiple known sources. ... Utilising the Common Security Advisory Framework (CSAF), a standardised format for vulnerability advisories, the EUVD supports automation in the processing, consumption, and distribution of security advisories.

    The EUVD collects and references vulnerability information collected from existing databases (such as MITRE’s CVE DB, GitHub's Advisory Database, JVN iPedia, GSD-Database), adds additional information via references to advisories and alerts issued by national CSIRTs, mitigation and patching guidelines published by vendors, and enriches it with exploited vulnerability markings (such as CISA KEV) and FIRST’s Exploit Prediction scores (EPSS).

    (Note: ENISA has been tasked with establishing the EUVD as outlin

  • This could mean that health and fitness data is being transferred to US companies. While this may not be a dealbreaker for many people, I appreciated having an alternative from the UK to the major providers in the US.

  • What should a screenshot that is about 12 years old prove or not prove? Technology has advanced significantly since then. Over the past decade, we've developed a range of new encryption algorithms, improved password hashing methods, TLS 1.3, post-quantum cryptography, and much more. The "Game of Trust" can be extended indefinitely, but using a 12-year-old screenshot as evidence for a situation in 2025 is questionable.