-
12 votes
-
archive.today is directing a DDOS attack against my blog
64 votes -
Update on developer access and platform security | Spotify for Developers
10 votes -
Google's quarterly report on adversarial use of AI for Q4 2025
11 votes -
US Federal Aviation Administration reopens El Paso airport hours after saying it was grounding flights for ten days
16 votes -
Airspace closure in the Texas border city of El Paso followed spat over drone-related tests and party balloon shoot-down, sources say
13 votes -
US FBI stymied by Apple’s Lockdown Mode after seizing journalist’s iPhone
36 votes -
AI will compromise your cybersecurity posture
8 votes -
I need a sanity check from security experts (opening ports on the router)
First, let me just say that I'm tech savvy, but I'm self taught for the most part. I never studied cybersecurity or network security. I know the basics, but not the nitty-gritty. I used to host my...
First, let me just say that I'm tech savvy, but I'm self taught for the most part. I never studied cybersecurity or network security. I know the basics, but not the nitty-gritty.
I used to host my own Anytype Server (note taking app) on my raspberry pi. To do this, the documentation says that I need to open two ports, one TCP and another UDP. So that's what I did, and had it set up this way for a while now.
Yesterday though, my raspberry's microSD died. So while I wait for the new one to arrive, I'm taking the chance to review my home network settings.
I closed off a third port that I had for my synology server (for the OpenVPN). I am now using Wireguard (with Tailscale) which doesn't require opening ports. And since my raspberry is offline, I also turned off the other two ports (as of now, I have none opened)
So here's the thing: I remember from my searching that a lot of people are strongly averse to opening ports. Iirc, the basic idea is that if a bad actor knows my home IP and which ports are open, they can enter. So, in theory, a hacker could potentially infiltrate my raspberry pi - and from there potentially wreak havoc in my other devices.
So my questions are:
1- Is it really like that? Could a hacker gain unlimited access to my raspberry via an opened port?
2- If yes, is there something that I can do to strengthen my raspberry pi security?
3- Am I being overly paranoid by worrying about this, even if it’s theoretically possible?12 votes -
Notepad++ hijacked by state-sponsored hackers
55 votes -
Moltbot personal assistant goes viral – and so do your secrets
38 votes -
ELECTRUM targeted Poland’s distributed energy systems
7 votes -
Disrupting the world's largest residential proxy network
20 votes -
Curl will end its bug bounty program by the end of January due to excessive AI generated reports
63 votes -
Why does ssh send 100 packets per keystroke?
28 votes -
Hacktivist deletes white supremacist websites live onstage at a cybersecurity conference while dressed as the pink Power Ranger
52 votes -
Quantum structured light could transform secure communication and computing
6 votes -
Danish energy company Ørsted said on Friday that it had launched a legal challenge to the US government's suspension of its Revolution Wind project off Rhode Island
9 votes -
39C3 - Chaos Communications Congress (2025)
16 votes -
PornHub extorted after hackers steal Premium member activity data
33 votes -
Tildes login session management?
Does Tildes have any way for me to logout of a device I'm not currently using? I don't see any session management or "logout of all devices" in the settings. Would resetting my password invalidate...
Does Tildes have any way for me to logout of a device I'm not currently using?
- I don't see any session management or "logout of all devices" in the settings.
- Would resetting my password invalidate all active sessions?
- Do I need to email someone?
21 votes -
AI agents find $4.6M in blockchain smart contract exploits
10 votes -
Over 120,000 home cameras hacked for 'sexploitation' footage
54 votes -
Poets are now cybersecurity threats: Researchers used 'adversarial poetry' to trick AI into ignoring its safety guard rails and it frequently worked
28 votes -
Disrupting the first reported AI-orchestrated cyber espionage campaign
16 votes -
Mozilla Firefox gets new anti-fingerprinting defenses
59 votes -
The spy who came in from the WiFi: Beware of radio network surveillance!
27 votes -
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
62 votes -
The day my smart vacuum turned against me
33 votes -
Norwegian public transport operator Ruter has shared the results of a comprehensive cybersecurity test of electric buses, conducted in an isolated mountain environment
10 votes -
10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.
77 votes -
Unseeable prompt injections in screenshots: more vulnerabilities in Comet and other AI browsers
35 votes -
How I reversed Amazon's Kindle web obfuscation because their app sucked
46 votes -
Greg Kroah-Hartman explains the Cyber Resilience Act for open source developers
7 votes