codeinabox@programming.devEnglish · 11 hours agoNpm Slop & Wonky Software Supply Chainsplus-squaresimonramstedt.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkNpm Slop & Wonky Software Supply Chainsplus-squaresimonramstedt.comcodeinabox@programming.devEnglish · 11 hours agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 7 days agoAnthropic secretly installs spyware when you install Claude Desktopplus-squarewww.thatprivacyguy.comexternal-linkmessage-square18linkfedilinkarrow-up1182arrow-down14
arrow-up1178arrow-down1external-linkAnthropic secretly installs spyware when you install Claude Desktopplus-squarewww.thatprivacyguy.comcodeinabox@programming.devEnglish · 7 days agomessage-square18linkfedilink
codeinabox@programming.devEnglish · 3 days agoMythos Mystery in Mozilla Numbers: How 22 Vulns Became 271 or Maybe 3 in Aprilplus-squarewww.flyingpenguin.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMythos Mystery in Mozilla Numbers: How 22 Vulns Became 271 or Maybe 3 in Aprilplus-squarewww.flyingpenguin.comcodeinabox@programming.devEnglish · 3 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 6 days agoThe Vercel breach started at a tool nobody was watchingplus-squaresiddhantkhare.comexternal-linkmessage-square1linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkThe Vercel breach started at a tool nobody was watchingplus-squaresiddhantkhare.comcodeinabox@programming.devEnglish · 6 days agomessage-square1linkfedilink
justsouichi@programming.devEnglish · edit-24 days agopompelmi – ClamAV antivirus scanning for Node.js, zero dependenciesplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down12
arrow-up10arrow-down1external-linkpompelmi – ClamAV antivirus scanning for Node.js, zero dependenciesplus-squaregithub.comjustsouichi@programming.devEnglish · edit-24 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 9 days agoWe Reproduced Anthropic's Mythos Findings With Public Modelsplus-squareblog.vidocsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkWe Reproduced Anthropic's Mythos Findings With Public Modelsplus-squareblog.vidocsecurity.comcodeinabox@programming.devEnglish · 9 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 10 days agoThe Boy That Cried Mythos: Verification is Collapsing Trust in Anthropicplus-squarewww.flyingpenguin.comexternal-linkmessage-square1linkfedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkThe Boy That Cried Mythos: Verification is Collapsing Trust in Anthropicplus-squarewww.flyingpenguin.comcodeinabox@programming.devEnglish · 10 days agomessage-square1linkfedilink
codeinabox@programming.devEnglish · 11 days agoCybersecurity Looks Like Proof of Work Nowplus-squarewww.dbreunig.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCybersecurity Looks Like Proof of Work Nowplus-squarewww.dbreunig.comcodeinabox@programming.devEnglish · 11 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 12 days agoDependency cooldowns turn you into a free-riderplus-squarecalpaterson.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkDependency cooldowns turn you into a free-riderplus-squarecalpaterson.comcodeinabox@programming.devEnglish · 12 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 12 days agoAI “Watershed Moment” or expensive pen tester? The AISI Mythos Dataplus-squareblog.robbowley.netexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkAI “Watershed Moment” or expensive pen tester? The AISI Mythos Dataplus-squareblog.robbowley.netcodeinabox@programming.devEnglish · 12 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 13 days agoOur evaluation of Claude Mythos Preview’s cyber capabilitiesplus-squarewww.aisi.gov.ukexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkOur evaluation of Claude Mythos Preview’s cyber capabilitiesplus-squarewww.aisi.gov.ukcodeinabox@programming.devEnglish · 13 days agomessage-square1linkfedilink
codeinabox@programming.devEnglish · 15 days agoNo one owes you supply-chain securityplus-squarepurplesyringa.moeexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNo one owes you supply-chain securityplus-squarepurplesyringa.moecodeinabox@programming.devEnglish · 15 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 16 days agoGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle rolls out end-to-end encryption for Gmail on Android and iOS devices for enterprise users, letting them read and compose emails without additional toolsplus-squarewww.bleepingcomputer.comInnerworld@lemmy.worldEnglish · 16 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 18 days agoPackage Security Problems for AI Agentsplus-squarenesbitt.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPackage Security Problems for AI Agentsplus-squarenesbitt.iocodeinabox@programming.devEnglish · 18 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 19 days agoAssessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAssessing Claude Mythos Preview’s cybersecurity capabilitiesplus-squarered.anthropic.comcodeinabox@programming.devEnglish · 19 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 19 days agoMinimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMinimum Release Age is an Underrated Supply Chain Defenseplus-squaredaniakash.comcodeinabox@programming.devEnglish · 19 days agomessage-square0linkfedilink
buskill@lemdro.idEnglish · 19 days agoBounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBounty Available (>$2,000) for QubesOS BusKill packageplus-squarewww.buskill.inbuskill@lemdro.idEnglish · 19 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 22 days agoOpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpenClaw gives users yet another reason to be freaked out about securityplus-squarearstechnica.comcodeinabox@programming.devEnglish · 22 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 22 days agoStop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.meexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStop Committing Your Secrets (You Know Who You Are)plus-squarejfmaes.mecodeinabox@programming.devEnglish · 22 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 23 days agoDon’t let A.I. read your .env filesplus-squarefiliphric.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDon’t let A.I. read your .env filesplus-squarefiliphric.comcodeinabox@programming.devEnglish · 23 days agomessage-square0linkfedilink