use the following search parameters to narrow your results:
e.g. subreddit:pics site:imgur.com dog
subreddit:pics site:imgur.com dog
advanced search: by author, sub...
~2 users here now
Here is a list of proxy IPs to help block KillNet's DDoS bots
submitted 6 hours ago by TheRealPanzer from theregister.com
Remove Online Information - Delete negative information from the internet
submitted 1 day ago by joechierotti from removeonlineinformation.com
Until further notice, think twice before using Google to download software
submitted 2 days ago by TheRealPanzer from arstechnica.com
Rootkit Hunter scans systems for known and unknown rootkits, backdoors, sniffers and exploits
submitted 9 days ago by TheRealPanzer from rkhunter.sourceforge.net
A network of knockoff apparel stores exposed 330,000 customer credit cards
submitted 11 days ago by TheRealPanzer from techcrunch.com
LastPass breach gets worse
submitted 12 days ago by Drewski from goto.com
Hackers now use Microsoft OneNote attachments to spread malware
submitted 16 days ago by TheRealPanzer from bleepingcomputer.com
U.S. airline accidentally exposes ‘No Fly List’ on unsecured server
submitted 17 days ago by TheRealPanzer from dailydot.com
NortonLifeLock warns that hackers breached Password Manager accounts
submitted 21 days ago by SoCo from bleepingcomputer.com
Android TV box on Amazon came pre-installed with malware
A government watchdog spent $15,000 to crack a federal agency's passwords in minutes
submitted 25 days ago by SoCo from techcrunch.com
Threema Messenger billed as better than Signal is riddled with vulnerabilities
submitted 27 days ago by Drewski from arstechnica.com
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More
submitted 27 days ago by SoCo from samcurry.net
Rackspace says hackers accessed customer data (of their antiquated hosted email services) during ransomware attack
submitted 28 days ago by SoCo from techcrunch.com
Passwords are weaker than you believe
submitted 29 days ago by TheRealPanzer from cendyne.dev
Watch out for QR code scams being sent through email
submitted 1 month ago by TheRealPanzer from komando.com
The Man Who Angered Anonymous And Lived To Regret It (25:17) ~ KiraTV
submitted 1 month ago by JasonCarswell from youtube.com
SSH server hardening
submitted 1 month ago by TheRealPanzer from ittavern.com
It’s time to stop ignoring the risks of passwords
submitted 1 month ago by TheRealPanzer from venturebeat.com
Apple fixes ‘actively exploited’ zero-day affecting most iPhones
submitted 1 month ago by Drewski from techcrunch.com
How North Korea’s Hackers Became Dangerously Good
submitted 1 month ago by Drewski from wsj.com
TSA now wants to scan your face at security
submitted 2 months ago by TheRealPanzer from archive.ph
Consider Disabling Browser Push Notifications on Family and Friends Devices
submitted 2 months ago by Drewski from lloydatkinson.net
Lastpass says hackers accessed customer data in new breach
submitted 2 months ago by Drewski from bleepingcomputer.com
URLhaus - the purpose of the project is to collect, track and share malware URLs, helping network administrators and security analysts to protect their network and customers from cyber threats
submitted 2 months ago by TheRealPanzer from urlhaus.abuse.ch
If you see one of these area codes don’t answer — It’s probably a scam
submitted 2 months ago by TheRealPanzer from komando.com
Accidental $70k Google Pixel Lock Screen Bypass
submitted 2 months ago by Drewski from bugs.xdavidhu.me
"Anyone running an (Mastodon) instance can see your hashed password and all user data, read all of your DMs and take over your account."
submitted 3 months ago by TheRealPanzer from twitter.com
Usenix Security 22 videos released
submitted 3 months ago by TheRealPanzer from usenix.org
The Various Pros and Cons of Shared and VPS Hosting
submitted 3 months ago by iton12344 from sktthemes.org
Patch OpenSSL on November 1 to avoid “Critical” Security Vulnerability
submitted 3 months ago by Drewski from globalsign.com
Big Tech is Demanding Our Personal Cell Phone Numbers but No One is Talking About it.
submitted 3 months ago * by raven9 from self.Security
Linux Foundation, Not ‘Supply Chain’ Nonsense, is Becoming the Biggest Threat to Linux Security and Computing Security (It’s Deliberate)
submitted 3 months ago by TheRealPanzer from techrights.org
Phishing works so well crims won't bother with deepfakes
submitted 3 months ago by TheRealPanzer from theregister.com
Everyone going to the World Cup must have this app - experts are now sounding the alarm
submitted 3 months ago by TheRealPanzer from nrk.no
Critical Remote Code Execution Vulnerability in JXPath Library (CVE-2022-41852)
submitted 3 months ago by majk from hackinglab.cz
Heat from fingertips can be used to crack passwords
submitted 3 months ago by TheRealPanzer from archive.ph
Signal is secure, as proven by hackers
submitted 4 months ago by TheRealPanzer from kaspersky.co.uk
Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer
submitted 4 months ago by TheRealPanzer from thehackernews.com
Security Vulnerabilities in Covert CIA Websites
submitted 4 months ago by TheRealPanzer from schneier.com
Serious vulnerabilities in Matrix’s end-to-end encryption have been patched
submitted 4 months ago by Drewski from arstechnica.com
Google, Microsoft can get your passwords via web browser's spellcheck
submitted 4 months ago by TheRealPanzer from bleepingcomputer.com
Security Threats of Public Wi-Fi - Is It Just Fearmongering?
submitted 4 months ago by TheRealPanzer from zitadel.com
The most secure cloud is your computer
submitted 5 months ago by TheRealPanzer from anita-app.com
Blocking Ads and malware with Pi-hole
submitted 5 months ago by TheRealPanzer from allthingstech.ch
PETEP (Open-Source TCP Proxy for Hacking)
submitted 5 months ago by majk from self.Security
Hacker shows why TSA is “security theater” | Evan Booth for Heretics (5:00) ~ Freethink
submitted 5 months ago by JasonCarswell from youtube.com
Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug
submitted 5 months ago by Drewski from bleepingcomputer.com
Streaming Service Crunchyroll Blocks Privacy-Focused Email Tutanota Because "Hackers use it"
submitted 5 months ago by TheRealPanzer from news.itsfoss.com
An encrypted ZIP file can have two correct passwords
submitted 5 months ago by TheRealPanzer from bleepingcomputer.com
We can make our phones harder to hack but complete security is a pipe dream
submitted 5 months ago by TheRealPanzer from theguardian.com
Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits/LKMs or by another hidden technique.
submitted 5 months ago by TheRealPanzer from unhide-forensics.info
Erik Prince wants to sell you a “secure” smartphone that’s too good to be true
submitted 5 months ago by TheRealPanzer from technologyreview.com
The world's best password advice
submitted 5 months ago by TheRealPanzer from michaelhorowitz.com
iOS VPNs have leaked traffic for more than 2 years, researcher claims
submitted 5 months ago by TheRealPanzer from arstechnica.com
NthLink VPN found to be using same pre-shared keys for all users
submitted 5 months ago by TheRealPanzer from twitter.com
Complete guide for the paranoid user
submitted 5 months ago by TheRealPanzer from eldritchdata.neocities.org
Firefox & AppArmor hardening - Custom rules
submitted 6 months ago by TheRealPanzer from dedoimedo.com
Wi-Fine - it is fine to use public Wi-Fi
submitted 6 months ago by TheRealPanzer from wifine.gitlab.io
More Pixel 6a owners find that any fingerprint can unlock the phone
submitted 6 months ago by TheRealPanzer from 9to5google.com
Router Security
submitted 6 months ago by TheRealPanzer from routersecurity.org
Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us
submitted 6 months ago by TheRealPanzer from arstechnica.com
Critical flaws in GPS tracker enable “disastrous” and “life-threatening” hacks
The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.
submitted 6 months ago by TheRealPanzer from self.Security
Researchers have discovered a vulnerability in Honda vehicles that could allow hackers to unlock doors and start the cars remotely. Affects all Honda models released between 2012 and 2022.
submitted 7 months ago by TheRealPanzer from bogleheads.org
Threema: Three Strikes, You’re Out
submitted 7 months ago by Drewski from soatok.blog
Oblivious DNS-over-HTTPS - security engineers are proposing an experimental protocol that promises greater privacy in how DNS operates.
submitted 7 months ago by TheRealPanzer from portswigger.net
The HDMI firewall prevents devices from hacking HDMI equipment, and vice-versa.
submitted 7 months ago by TheRealPanzer from git.cuvoodoo.info
Mega says it can’t decrypt your files. New POC exploit shows otherwise.
submitted 7 months ago by TheRealPanzer from arstechnica.com
All Chromium browsers store passwords and sensitive data in clear text in memory
submitted 7 months ago by TheRealPanzer from borncity.com
LastPass no longer requires a password to access your vault, moving to flawed FIDO
submitted 8 months ago by SoCo from engadget.com
Add Privacy and Security Using Email Aliases With Bitwarden
submitted 8 months ago by TheRealPanzer from bitwarden.com
Netbird is an open-source VPN management platform built on top of WireGuard making it easy to create secure private networks for your organization or home.
submitted 8 months ago by TheRealPanzer from github.com
Defending against malicious bots with a zip bomb
submitted 8 months ago by TheRealPanzer from kerkour.com
Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).
submitted 8 months ago by TheRealPanzer from tails.boum.org
The passwords most used by CEOs are startlingly dumb
submitted 8 months ago by TheRealPanzer from pcgamer.com
Firefox debuts improved process isolation to reduce browser attack surface
submitted 8 months ago by TheRealPanzer from portswigger.net
NSA Swears It Won't Allow Backdoors in New Encryption Standards
submitted 8 months ago by Drewski from gizmodo.com
Some Cryptography Books I Like - Cronokirby
submitted 8 months ago by Drewski from cronokirby.com
Researchers Identify ‘Master Problem’ Underlying All Cryptography
submitted 8 months ago by Drewski from quantamagazine.org
deSEC is a free DNS hosting service, designed with security in mind
submitted 9 months ago by TheRealPanzer from desec.io
Mistborn is your own virtual private cloud platform and WebUI that manages self hosted services, and secures them with firewall, Wireguard VPN w/ PiHole-DNSCrypt, and IP filtering
submitted 9 months ago by TheRealPanzer from gitlab.com
WebApps provides a secure way to browse popular webapps by eliminating referrers, 3rd party requests, cookies, cross-site scripting, etc.
submitted 9 months ago by TheRealPanzer from f-droid.org
7-Zip up to 21.07 on Windows allows privilege escalation and command execution
submitted 9 months ago by Drewski from github.com
Researchers Uncover a Hardware Security Vulnerability on Android Phones
submitted 10 months ago by Drewski from cyberkendra.com
Lupinia Studios - I'm a Scam Prevention Expert, and I Got Scammed
submitted 10 months ago by Drewski from lupinia.net
Kicksecure - a secure by default operating system
submitted 10 months ago by TheRealPanzer from kicksecure.com
AppTotal - analyze suspicious OAuth apps to identify malicious apps, highlight risks, ...
submitted 10 months ago by TheRealPanzer from apptotal.io
North Korean hackers exploit Chrome zero-day weeks before patch
submitted 10 months ago by Drewski from bleepingcomputer.com
A team of Ukrainian software engineers have developed a game called “Play for Ukraine” that crowdsources and gamifies participation in DDOS attacks against selected Russian government and media websites
submitted 10 months ago by TheRealPanzer from fastcompany.com
Another data-leaking Spectre bug found, smashes Intel, Arm defenses
submitted 10 months ago by TheRealPanzer from theregister.com
"I can probably hack your password in MINUTES!"
submitted 11 months ago by TheRealPanzer from docs.aista.com
SentryPeer - a distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot
submitted 11 months ago by TheRealPanzer from sentrypeer.org
Merry Maker is a fully scalable tool to detect the presence of digital skimmers
submitted 11 months ago by TheRealPanzer from csoonline.com
LAN port scan forbidder - forbid untrusted web to scan localhost or LAN
submitted 11 months ago by TheRealPanzer from github.com
wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data
submitted 11 months ago by TheRealPanzer from wolfssl.com
Rogueport identifies network ports which are not supposed to be open
JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection
submitted 11 months ago by TheRealPanzer from jshelter.org
SafeToOpen detects never-before-seen phishing websites by inspecting the visual and non-visual elements of the websites in real-time and preventing users give away their sensitive information
submitted 11 months ago by TheRealPanzer from safetoopen.com
Researchers shared technical details of NSA Equation Group’s 'Bvp47' Backdoor
submitted 11 months ago by infocom6502 from cybersecurityworldconference.com