Tea@programming.dev to cybersecurity@infosec.pub · edit-213 hours agoUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comexternal-linkmessage-square10fedilinkarrow-up196arrow-down18
arrow-up188arrow-down1external-linkUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comTea@programming.dev to cybersecurity@infosec.pub · edit-213 hours agomessage-square10fedilink
Tea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 day agoFeds Arrest Man For Sharing Pre-Release DVD Rips of 'Spider-Man: No Way Home,' 'Dune,' ' 'Venom: Let There Be Carnage,' and More, Online Before Official Release for Millions to Watch.plus-squarewww.justice.govexternal-linkmessage-square18fedilinkarrow-up1102arrow-down10
arrow-up1102arrow-down1external-linkFeds Arrest Man For Sharing Pre-Release DVD Rips of 'Spider-Man: No Way Home,' 'Dune,' ' 'Venom: Let There Be Carnage,' and More, Online Before Official Release for Millions to Watch.plus-squarewww.justice.govTea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 day agomessage-square18fedilink
Tea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 2 days agoAd-Funded Piracy's 'Biggest Open Secret' Revealed By Researcher.plus-squaretorrentfreak.comexternal-linkmessage-square2fedilinkarrow-up129arrow-down11
arrow-up128arrow-down1external-linkAd-Funded Piracy's 'Biggest Open Secret' Revealed By Researcher.plus-squaretorrentfreak.comTea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 2 days agomessage-square2fedilink
Tea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 3 days agoNintendo Defeats Filehoster '1Fichier' at French Supreme Court.plus-squaretorrentfreak.comexternal-linkmessage-square3fedilinkarrow-up155arrow-down10
arrow-up155arrow-down1external-linkNintendo Defeats Filehoster '1Fichier' at French Supreme Court.plus-squaretorrentfreak.comTea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 3 days agomessage-square3fedilink
Tea@programming.dev to cybersecurity@infosec.pub · 3 days agoExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioTea@programming.dev to cybersecurity@infosec.pub · 3 days agomessage-square0fedilink
Tea@programming.dev to cybersecurity@infosec.pub · 3 days agoMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comTea@programming.dev to cybersecurity@infosec.pub · 3 days agomessage-square0fedilink
Tea@programming.dev to cybersecurity@infosec.pub · edit-24 days agoViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govTea@programming.dev to cybersecurity@infosec.pub · edit-24 days agomessage-square0fedilink
Tea@programming.dev to cybersecurity@infosec.pub · 4 days agoUnmasking the new persistent attacks on Japan.plus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkUnmasking the new persistent attacks on Japan.plus-squareblog.talosintelligence.comTea@programming.dev to cybersecurity@infosec.pub · 4 days agomessage-square0fedilink
Tea@programming.dev to cybersecurity@infosec.pub · edit-24 days agoStealers and backdoors are spreading under the guise of a DeepSeek client.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkStealers and backdoors are spreading under the guise of a DeepSeek client.plus-squaresecurelist.comTea@programming.dev to cybersecurity@infosec.pub · edit-24 days agomessage-square0fedilink
Tea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 4 days agoRootedCON: Pirate IPTV Blocking Appeal Accepted as Crisis Continues.plus-squaretorrentfreak.comexternal-linkmessage-square2fedilinkarrow-up131arrow-down10
arrow-up131arrow-down1external-linkRootedCON: Pirate IPTV Blocking Appeal Accepted as Crisis Continues.plus-squaretorrentfreak.comTea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 4 days agomessage-square2fedilink
Tea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 4 days agoNintendo Easily Kills 4,238 Switch Emu Repos on Yuzu Lawsuit Anniversary.plus-squaretorrentfreak.comexternal-linkmessage-square35fedilinkarrow-up1125arrow-down11
arrow-up1124arrow-down1external-linkNintendo Easily Kills 4,238 Switch Emu Repos on Yuzu Lawsuit Anniversary.plus-squaretorrentfreak.comTea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 4 days agomessage-square35fedilink
Tea@programming.dev to cybersecurity@infosec.pub · edit-24 days agoBADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected(backdoored) with malware that conscripts them into a botnet.plus-squarewww.humansecurity.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected(backdoored) with malware that conscripts them into a botnet.plus-squarewww.humansecurity.comTea@programming.dev to cybersecurity@infosec.pub · edit-24 days agomessage-square0fedilink
Tea@programming.dev to cybersecurity@infosec.pub · 5 days agoI spoke to a task scammer. Here's how it went.plus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up138arrow-down11
arrow-up137arrow-down1external-linkI spoke to a task scammer. Here's how it went.plus-squarewww.malwarebytes.comTea@programming.dev to cybersecurity@infosec.pub · 5 days agomessage-square0fedilink
Tea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 5 days agoHollywood Studios Sue Pirate IPTV Services in U.S. Court.plus-squaretorrentfreak.comexternal-linkmessage-square3fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkHollywood Studios Sue Pirate IPTV Services in U.S. Court.plus-squaretorrentfreak.comTea@programming.dev to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 5 days agomessage-square3fedilink
Tea@programming.dev to cybersecurity@infosec.pub · edit-25 days agoUndercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkUndercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.plus-squaresecurelist.comTea@programming.dev to cybersecurity@infosec.pub · edit-25 days agomessage-square0fedilink
Tea@programming.dev to cybersecurity@infosec.pub · 5 days agoSilk Typhoon targeting IT supply chain.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSilk Typhoon targeting IT supply chain.plus-squarewww.microsoft.comTea@programming.dev to cybersecurity@infosec.pub · 5 days agomessage-square0fedilink
Tea@programming.dev to Android@lemdro.idEnglish · edit-25 days agoCookies, identifiers “silently stored” on Android phones by Google apps.plus-squarewww.tcd.ieexternal-linkmessage-square1fedilinkarrow-up129arrow-down12
arrow-up127arrow-down1external-linkCookies, identifiers “silently stored” on Android phones by Google apps.plus-squarewww.tcd.ieTea@programming.dev to Android@lemdro.idEnglish · edit-25 days agomessage-square1fedilink
Tea@programming.dev to Android@lemdro.idEnglish · 5 days agoGoogle Launches AI Scam Detection for Calls & Texts in their Phone and Messages Apps.plus-squaresecurity.googleblog.comexternal-linkmessage-square1fedilinkarrow-up123arrow-down12
arrow-up121arrow-down1external-linkGoogle Launches AI Scam Detection for Calls & Texts in their Phone and Messages Apps.plus-squaresecurity.googleblog.comTea@programming.dev to Android@lemdro.idEnglish · 5 days agomessage-square1fedilink
Tea@programming.dev to cybersecurity@infosec.pub · 5 days agoCall It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.plus-squarewww.proofpoint.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCall It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.plus-squarewww.proofpoint.comTea@programming.dev to cybersecurity@infosec.pub · 5 days agomessage-square0fedilink
Tea@programming.dev to cybersecurity@infosec.pub · edit-26 days agoHacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit.plus-squareicode4.coffeeexternal-linkmessage-square0fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkHacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit.plus-squareicode4.coffeeTea@programming.dev to cybersecurity@infosec.pub · edit-26 days agomessage-square0fedilink
minus-squareTea@programming.devOPtoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•HBO Max downgrades lifetime subscription.linkfedilinkEnglisharrow-up10·8 days agoI believe the table is correct, maybe the contributor confused them. linkfedilink
minus-squareTea@programming.devOPtoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Telegram Shuts Down Z-Library Download Bot and Backup Communication Channel.linkfedilinkEnglisharrow-up7·12 days agoHow do you discover providers on simplex? linkfedilink
minus-squareTea@programming.devOPtoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Telegram Shuts Down Z-Library & Anna's Archive Channels Over Copyright Infringement.linkfedilinkEnglisharrow-up2·12 days agoNo problem, I will resubmit later. I used the wrong article link anyway. linkfedilink
I believe the table is correct, maybe the contributor confused them.