#computer-security — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #computer-security, aggregated by home.social.
-
Fake #OpenAI #repository on #Hugging #Face pushes #infostealer #malware A #malicious #HuggingFace repository that reached the platform’s trending list impersonated OpenAI’s “Privacy Filter” project to deliver information-stealing malware to Windows users.
The repository briefly reached #1 on Hugging Face and accumulated 244,000 downloads before the platform responded to reports and removed it.
#computersecurity #security -
We're meeting tonight! Friday 1st May at #Glasgow #hackerspace - @thegamerclub at 153 Bath Lane from 6pm 'til late - all welcome!
Hackers, crackers, geeks, hats of any colour, technology enthusiasts, hacktivists, and other like-minded folks are most welcome. We do not judge anyone and everyone has something to contribute, no matter their level of expertise!
Also join us in Matrix at #2600:glasgow.social (invite link: https://glasgow.social/matrix)
-
The thing about computer security is that while it is by no means absolute, that doesn't mean it's pointless. In the same way it's not pointless to avoid posting your credit card number online just because people can still steal it if you don't, it's not pointless to avoid revealing other information about yourself just because there are people who can find that information through other means.
In fact it is a general principle that perfect security is impossible, whether online or offline. Increased security can sometimes also come at unacceptable cost, not just in money, but time, convenience, and social connection. So good security is about finding good tradeoffs, and what may be acceptable to one person may not be to another.
But learning about security can help you figure out whether it's worthwhile to change your security practices. -
The New York Times - Breaking News, US News, World News and Videos [Unofficial] @[email protected] ·OpenAI Unveils Its New, More Powerful GPT-5.5 Model
https://web.brid.gy/r/https://www.nytimes.com/2026/04/23/technology/openai-new-model.html
-
The New York Times - Breaking News, US News, World News and Videos [Unofficial] @[email protected] ·Anthropic’s New Mythos A.I. Model Sets Off Global Alarms
https://web.brid.gy/r/https://www.nytimes.com/2026/04/22/technology/anthropics-mythos-ai.html
-
How to Think Like a Security Researcher by Ilkay Adil is free with a Leanpub Reader membership! Or you can buy it for $1.99! https://leanpub.com/security-researcher-mindset #ComputerProgramming #ComputerSecurity
-
How to Think Like a Security Researcher by Ilkay Adil is free with a Leanpub Reader membership! Or you can buy it for $1.99! https://leanpub.com/security-researcher-mindset #ComputerProgramming #ComputerSecurity
-
https://youtube.com/watch?v=V6pgZKVcKpw
If you only watch one video on cyber security this year, make it this one
#infosec #informationsecurity #security #computersecurity #internetsecurity #vulnerability #bugs #bugbounty #cybersecurity #monoculture #cyber
-
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an ... https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html
#computersecurity #vulnerabilities #Uncategorized #cybersecurity #patching #LLM #AI
-
Hands-on web security, 2026-04-09, 12:00
A "Capture the Flag" (#CTF) is an ethical game for learning and practising #computersecurity skills in a legal environment. We will play #OverTheWire Natas, which teaches web application security. To solve each level, you need to find vulnerabilities by inspecting the website's source code, HTTP headers, or cookies, finding hidden directories, injecting SQL code, and more.
Open for all, no registration needed.
-
Ugh! Even after the 18.7.7 update, #Apple *still* nags you to “upgrade” to #iOS v26 though. 😒
Tim Apple, I *don’t* want that silly #LiquidGlass abomination. ✋🏽🙅🏽♂️
#Security #UX #ComputerSecurity #iPhone #iPad #DarkSword #Design #Nags #Nagging
-
We're meeting tonight! Friday 11th Apr at #Glasgow #hackerspace - @thegamerclub at 153 Bath Lane from 6pm 'til late - all welcome!
Hackers, crackers, geeks, hats of any colour, technology enthusiasts, hacktivists, and other like-minded folks are most welcome. We do not judge anyone and everyone has something to contribute, no matter their level of expertise!
Also join us in Matrix at #2600:glasgow.social (invite link: https://glasgow.social/matrix)
-
True that:
“Every Dependency You Add Is A Supply Chain Attack Waiting To Happen”, Ben Hoyt (https://benhoyt.com/writings/dependencies/).
Via Lobsters: https://lobste.rs/s/j6uemk/every_dependency_you_add_is_supply_chain
On HN: https://news.ycombinator.com/item?id=47613210
#Security #Dependencies #Programming #SupplyChainAttacks #ComputerSecurity
-
Programming Linux Anti-Reversing Techniques by Jacob Baines is free with a Leanpub Reader membership! Or you can buy it for $7.99! https://leanpub.com/anti-reverse-engineering-linux #ComputerSecurity #CAndCpp
-
The course Cybersecurity Deconstructed by Steve T. is on sale on Leanpub! Its suggested price is $179.00; get it for $89.00 with this coupon: https://leanpub.com/c/cybersecurity-deconstructed/c/LeanpubWeeklySale20260324 #ComputerSecurity #CloudComputing #AmazonWebServices
-
The New York Times - Breaking News, US News, World News and Videos [Unofficial] @[email protected] ·Snapchat Investigated in Europe Over Child Safety Policies
https://web.brid.gy/r/https://www.nytimes.com/2026/03/26/business/snapchat-europe-child-safety.html
-
Programming Linux Anti-Reversing Techniques by Jacob Baines is free with a Leanpub Reader membership! Or you can buy it for $7.99! https://leanpub.com/anti-reverse-engineering-linux #ComputerSecurity #CAndCpp
-
Cybersecurity Deconstructed: Advanced Techniques and Internals by Steve T. is the featured course on Leanpub!
Go beyond abstractions and master the core technical realities of modern cybersecurity. Deconstruct advanced network evasion and EDR bypass techniques, dissect sophisticated post-exploitation and cloud attack vectors, and analyze cryptographic failures and malware at their roots.
Link: https://leanpub.com/courses/leanpub/cybersecurity-deconstructed
#ComputerSecurity #CloudComputing #AmazonWebServices #MicrosoftAzure
-
Ghost in the Wires: The Making of a Modern Hacker by Dhairya Singh is free with a Leanpub Reader membership! Or you can buy it for $0.99! https://leanpub.com/ghostinwires #ComputerSecurity
-
The course Cybersecurity Deconstructed by Steve T. is on sale on Leanpub! Its suggested price is $179.00; get it for $89.00 with this coupon: https://leanpub.com/c/cybersecurity-deconstructed/c/LeanPublishingDaily20260318 #ComputerSecurity #CloudComputing #AmazonWebServices
-
CAS Internals: A Journey Through the Central Authentication Server Codebase by Dmitriy Kopylenko is the featured book on Leanpub!
Link: https://leanpub.com/cas-internals
#ComputerProgramming #SoftwareArchitecture #Java #ComputerSecurity #SoftwareEngineering
-
The course Cybersecurity Deconstructed by Steve T. is on sale on Leanpub! Its suggested price is $179.00; get it for $89.00 with this coupon: https://leanpub.com/c/cybersecurity-deconstructed/c/LeanpubWeeklySale20260317 #ComputerSecurity #CloudComputing #AmazonWebServices
-
Linux DevOps eBook Bundle by Bobby Iliev is the featured bundle on Leanpub!
Link: https://leanpub.com/b/linux-devops-ebook-bundle
#Databases #Mysql #Postgresql #ComputerProgramming #Devops #CloudComputing #Git #VersionControl #ComputerSecurity #ProgrammingCookbooks #SoftwareEngineering #Terraform