Qilin Claims Ransomware Attack on Mecklenburg Schools - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:33
comments (0)
Red Hat data breach escalates as ShinyHunters joins extortion
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:18
comments (0)
Electronics giant Avnet confirms breach, says stolen data unreadable
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:02
comments (0)
Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 17:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 17:46
comments (0)
U.S. CISA adds Smartbedded Meteobridge, Samsung, Juniper ScreenOS, Jenkins, and GNU Bash flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 14:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 14:46
comments (0)
XWorm malware resurfaces with ransomware module, over 35 plugins
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:46
comments (0)
Rhadamanthys 0.9.x - walk through the updates - Check Point Research
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:32
comments (0)
Oracle patches EBS zero-day exploited in Clop data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:01
comments (0)
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:47
comments (0)
New Study Warns Several Free iOS and Android VPN Apps Leak Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:31
comments (11)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:31
comments (11)
Massive surge in scans targeting Palo Alto Networks login portals
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:16
comments (0)
Hackers exploited Zimbra flaw as zero-day using iCalendar files
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:00
comments (0)
Stealing JWT Tokens via OAuth redirect_uri Manipulation: A Critical Vulnerability | by Shah kaif | Oct, 2025 | InfoSec Write-ups
(infosecwriteups.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:45
comments (0)
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:32
comments (0)
Chinese hackers exploiting VMware zero-day since October 2024
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
EOL Router Question/ OpenWRT
in cybersecurity@sh.itjust.works from sic_semper_tyrannis@lemmy.today on 07 Oct 13:11
comments (4)
in cybersecurity@sh.itjust.works from sic_semper_tyrannis@lemmy.today on 07 Oct 13:11
comments (4)
Medusa ransomware used during exploitation of GoAnywhere file transfer bug, Microsoft says | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:46
comments (0)
Hackers exploiting critical Oracle EBS flaw | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:30
comments (0)
Critical 9.9 Redis vulnerability enables remote code execution | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:17
comments (1)
Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:02
comments (0)
Rainwalk Pet Insurance Exposes 158 GB of US Customer and Pet Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:46
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:46
comments (2)
Abracadabra.money hacked again | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:30
comments (0)
Suspected Chinese cyber spies targeted Serbian aviation agency
(therecord.media)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:15
comments (0)
Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:02
comments (0)
Suspected Chinese cyber spies targeted Serbian aviation agency
(therecord.media)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
Chinese hackers exploiting VMware zero-day since October 2024
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
ShinyHunters launches Salesforce data leak site to extort 39 victims
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:55
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:55
comments (0)
CommetJacking attack tricks Comet browser into stealing emails
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:53
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:53
comments (1)
3rd Party Providing Discord Customer Service Breached
(www.theverge.com)
in cybersecurity@sh.itjust.works from HexesofVexes@lemmy.world on 04 Oct 09:24
comments (1)
in cybersecurity@sh.itjust.works from HexesofVexes@lemmy.world on 04 Oct 09:24
comments (1)
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.social on 04 Oct 03:07
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.social on 04 Oct 03:07
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Oct 16:55
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Oct 16:55
comments (3)
Le Tour du Hack 2025 talks now available on PeerTube!
(video.infosec.exchange)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 03 Oct 14:21
comments (1)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 03 Oct 14:21
comments (1)
Vulnerability Report - September 2025
in cybersecurity@infosec.pub from cm0002@sh.itjust.works on 03 Oct 14:16
comments (0)
in cybersecurity@infosec.pub from cm0002@sh.itjust.works on 03 Oct 14:16
comments (0)
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:30
comments (0)
Red Hat confirms security incident after hackers breach GitLab instance
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:15
comments (0)
766,000 Impacted by Data Breach at Dealership Software Provider Motility - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:01
comments (0)
Japan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shipping
(industrialcyber.co)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
Japan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shipping
(industrialcyber.co)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
Clop extortion emails claim theft of Oracle E-Business Suite data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:47
comments (0)
Renault UK Customer Records Stolen in Third-Party Breach
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:32
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:32
comments (5)
Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:17
comments (1)
Attacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warns
(www.cyber.gc.ca)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 11:46
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 11:46
comments (0)
Attacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warns
(www.cyber.gc.ca)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 11:45
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 11:45
comments (0)
State-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure"
(breached.company)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
State-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure"
(breached.company)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
New $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:16
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:16
comments (2)
Oracle customers being bombarded with emails claiming widespread data theft | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:02
comments (0)
South Korea raises cyber threat level after huge data centre fire sparks hacking fears | South Korea | The Guardian
(www.theguardian.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:15
comments (0)
Red Hat repos raided, claims cybercrew, files stolen • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:01
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:01
comments (5)
US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:45
comments (1)
Hour-Long Email Phishing Breach Affects PHI of 150,000
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:31
comments (0)
Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:17
comments (0)
China Requires 1-Hour Cybersecurity-Incident Reports
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:03
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:03
comments (1)
US gov shutdown leaves IT projects hanging, security defenders a skeleton crew
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 01 Oct 22:44
comments (2)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 01 Oct 22:44
comments (2)
'Delightful' Red Hat OpenShift AI bug allows full takeover
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 01 Oct 22:05
comments (1)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 01 Oct 22:05
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 01 Oct 17:16
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 01 Oct 17:16
comments (4)
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 15:32
comments (13)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 15:32
comments (13)
Smishing Campaigns Exploit Cellular Routers to Target Belgium - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:31
comments (0)
'Trifecta' of Gemini Flaws Turn AI Into Attack Vehicle
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:18
comments (0)
New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:02
comments (0)
SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:48
comments (0)
Industry groups worry about cyber info sharing as key US law is set to expire | Reuters
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:30
comments (0)
Chinese hacking group ‘Phantom Taurus’ targets governments
(www.telecomstechnews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (0)
Chinese hacking group ‘Phantom Taurus’ targets governments
(www.telecomstechnews.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (1)
Beijing-backed burglars master .NET to target government web servers
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 01 Oct 05:43
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 01 Oct 05:43
comments (0)
50K Cisco firewalls remain vulnerable to advanced attacks
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 18:55
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 18:55
comments (1)
CISA kills agreement with nonprofit that runs MS-ISAC
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 18:52
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 18:52
comments (0)
Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 16:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 16:44
comments (0)
Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:45
comments (0)
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:31
comments (0)
National Cyber Authorities Launch OT Security Guidance - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:17
comments (0)
'You'll never need to work again': Criminals offer reporter money to hack BBC
(www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:01
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:01
comments (4)
Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:48
comments (0)
Canada’s WestJet notifies American travelers whose data was hacked in June breach
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:32
comments (1)
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 03:12
comments (7)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 03:12
comments (7)
Tile exploit could let stalkers follow you with your own tracker — Bluetooth broadcasting flaw is relatively simple to exploit, researchers discover
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 03:12
comments (3)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 03:12
comments (3)
New Olymp Loader Malware-as-a-Service Promises Defender Bypass with Auto Certificate Signing
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:54
comments (0)
Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:26
comments (0)
Harrods Reveals Supply Chain Breach Impacting Online Customers
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:15
comments (0)
Google Ads Used to Spread Trojan Disguised as TradingView Premium
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:46
comments (1)
Medusa Ransomware Claims Comcast Data Breach, Demands $1.2M
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:34
comments (0)
New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:25
comments (0)
Fake Microsoft Teams installers push Oyster malware via malvertising
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 13:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 13:20
comments (0)
Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 12:36
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 12:36
comments (1)
Beijing's RedNovember hacked critical US, global orgs
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 11:35
comments (0)
Rainbet's $5000 bounty for a bug that could've cost them everything
(blog.z.org)
in cybersecurity@sh.itjust.works from maxfield@lemmy.world on 28 Sep 21:12
comments (0)
in cybersecurity@sh.itjust.works from maxfield@lemmy.world on 28 Sep 21:12
comments (0)
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
(thehackernews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
(thehackernews.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
Hacking Campaign Has Breached Cisco Devices in US Government
(www.bloomberg.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Sep 17:33
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Sep 17:33
comments (0)
Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Sep 00:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Sep 00:41
comments (1)
Besides them trying to upsell me a new router, what does this mean?
in cybersecurity@sh.itjust.works from StarvingMartist@sh.itjust.works on 25 Sep 20:41
comments (13)
in cybersecurity@sh.itjust.works from StarvingMartist@sh.itjust.works on 25 Sep 20:41
comments (13)
Exploring GrapheneOS secure allocator: Hardened Malloc
(www.synacktiv.com)
in cybersecurity@sh.itjust.works from Andromxda@lemmy.dbzer0.com on 25 Sep 16:14
comments (0)
in cybersecurity@sh.itjust.works from Andromxda@lemmy.dbzer0.com on 25 Sep 16:14
comments (0)
OnePlus leaves researchers on read over Android bug that exposes texts: Rapid7 warns flaw could let any app peek at your SMS, but smartphone vendor won't pick up
(www.rapid7.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:09
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:09
comments (0)
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
(cloud.google.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Sep 16:03
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Sep 16:03
comments (0)
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
(cloud.google.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:03
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:03
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Sep 15:46
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Sep 15:46
comments (2)
ShadowV2 Botnet Infects AWS Docker Containers to Launch DDoS Campaign
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:44
comments (0)
New YiBackdoor Allows Attackers to Execute Arbitrary Commands and Exfiltrate Sensitive Data from Hacked Systems
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:31
comments (0)
NPM package caught using QR Code to fetch cookie-stealing malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:38
comments (0)
CISA says hackers breached federal agency using GeoServer exploit
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:22
comments (0)
EV Charging Provider Confirm Data Breach - Customers Personal Data Exposed
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 11:52
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 11:52
comments (0)
Iranian Hackers Use Fake Job Lures to Breach Europe’s Critical Industries
(hackread.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Sep 07:17
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Sep 07:17
comments (0)
Iranian Hackers Use Fake Job Lures to Breach Europe’s Critical Industries
(hackread.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Sep 07:16
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 24 Sep 07:16
comments (0)
GitHub tightens npm security with mandatory 2FA, access tokens
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 18:34
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 18:34
comments (1)
22.2 Tbps DDoS Attack Breaks Internet With New World Record
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 17:02
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 17:02
comments (4)
New EDR-Freeze tool uses Windows WER to suspend security software
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 16:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 16:45
comments (1)
AsyncRAT spread through malicious SVG files imitating web portals
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:30
comments (1)
Malicious GitHub pages lure MacOS users into installing Atomic infostealer - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 13:01
comments (0)
Humber NHS board apologises for NRS Healthcare data breach
(www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:26
comments (0)
Automaker giant Stellantis confirms data breach after Salesforce hack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Sep 12:08
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Sep 20:38
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Sep 20:38
comments (0)
Safe by Default: Building a Minimal Sandbox in Linux
(medium.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Sep 14:54
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Sep 14:54
comments (2)
17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 14:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 14:35
comments (0)
FBI warns of cybercriminals using fake FBI crime reporting portals
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 13:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Sep 13:58
comments (0)
Privacy and Security Risks in the eSIM Ecosystem [pdf]
(www.usenix.org)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 22 Sep 05:54
comments (3)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 22 Sep 05:54
comments (3)
Microsoft’s Entra ID vulnerabilities could have been catastrophic
(arstechnica.com)
in cybersecurity@infosec.pub from Occhioverde@feddit.it on 21 Sep 21:19
comments (2)
in cybersecurity@infosec.pub from Occhioverde@feddit.it on 21 Sep 21:19
comments (2)
Heathrow flights delayed and cancelled as cyber-attack hits European airports
(www.theguardian.com)
in cybersecurity@infosec.pub from Blarylark@lemmy.world on 20 Sep 21:14
comments (1)
in cybersecurity@infosec.pub from Blarylark@lemmy.world on 20 Sep 21:14
comments (1)
Heathrow flights delayed and cancelled as cyber-attack hits European airports
(www.theguardian.com)
in cybersecurity@sh.itjust.works from Blarylark@lemmy.world on 20 Sep 21:14
comments (0)
in cybersecurity@sh.itjust.works from Blarylark@lemmy.world on 20 Sep 21:14
comments (0)
Cyberattack on Collins Aerospace Disrupts Operations at Major Airports
(cyberinsider.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Sep 13:34
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Sep 13:34
comments (0)
Cyberattack disrupts European airports including Heathrow, Brussels
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 09:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 09:58
comments (0)
Critical Microsoft's Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 22:47
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 22:47
comments (1)
Click Adventure: How a Banned Steam Game Drained Wallets and Dodged Steam Security
(steamcommunity.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
ChatGPT tricked to swipe sensitive data from Gmail
(www.radware.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Sep 15:11
comments (0)
Vulnerability-Lookup 2.16.0
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Sep 14:14
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Sep 14:14
comments (0)
Google patches sixth Chrome zero-day exploited in attacks this year
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:30
comments (1)
WatchGuard patches ‘critical’ VPN flaw in firewalls that could lead to compromise
(www.csoonline.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:19
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Sep 11:19
comments (2)
Cloudflare DDoSed itself with React useEffect hook blunder
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Sep 16:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Sep 16:46
comments (1)
Russia, China target German economy: Cyber attacks cost Germany almost 300 billion euros in past year, survey finds
(www.bitkom.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Sep 13:30
comments (1)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Sep 13:30
comments (1)
Russia, China target German economy: Cyber attacks cost Germany almost 300 billion euros in past year, survey finds
(www.bitkom.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Sep 13:29
comments (5)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 18 Sep 13:29
comments (5)
What use a smart card reader?
in cybersecurity@infosec.pub from BonkTheAnnoyed@lemmy.blahaj.zone on 18 Sep 03:24
comments (0)
in cybersecurity@infosec.pub from BonkTheAnnoyed@lemmy.blahaj.zone on 18 Sep 03:24
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Sep 14:12
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Sep 14:12
comments (0)
Satori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation - HUMAN Security
(www.humansecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 14:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 14:09
comments (0)
Founder of One of World’s Largest Hacker Forums(BreachForums) Resentenced to Three Years in Prison
(www.justice.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 17 Sep 13:58
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 17 Sep 13:58
comments (0)
Apple releases iOS 15.8.5 security update for 10-year old iPhone 6s
(support.apple.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 01:24
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 01:24
comments (0)
Self-Replicating Worm Hits 180+ Software Packages
(krebsonsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Sep 21:57
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Sep 21:57
comments (0)
Samsung patches zero-day security flaw used to hack into its customers' phones
(techcrunch.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 16 Sep 21:36
comments (0)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 16 Sep 21:36
comments (0)
Russian hackers target Polish hospitals and city water supply
(www.ft.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Sep 09:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Sep 09:10
comments (0)
Russian hackers target Polish hospitals and city water supply
(www.ft.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Sep 09:10
comments (2)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Sep 09:10
comments (2)
Hacker breaks into on-campus smart washing machines — management eventually disables devices, leaving thousands of students with no reliable laundry service
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 15 Sep 12:54
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 15 Sep 12:54
comments (1)
Security researchers discover China-linked malware used to infiltrate Philippine military company
(businessinsights.bitdefender.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 15 Sep 10:04
comments (1)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 15 Sep 10:04
comments (1)
Security researchers discover China-linked malware used to infiltrate Philippine military company
(businessinsights.bitdefender.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 15 Sep 10:04
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 15 Sep 10:04
comments (0)
Never steal a hacker’s girlfriend’s phone: How an expert exposed a global network of thieves
(english.elpais.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 13 Sep 10:38
comments (0)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 13 Sep 10:38
comments (0)
Never steal a hacker’s girlfriend’s phone: How an expert exposed a global network of thieves
(english.elpais.com)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 13 Sep 10:37
comments (3)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 13 Sep 10:37
comments (3)
Cybersecurity and Infrastructure Security Agency (CISA) wants to maintain control of CVE program
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 13 Sep 09:05
comments (2)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 13 Sep 09:05
comments (2)
Vulnerability Report - August 2025
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Sep 14:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Sep 14:06
comments (0)
Modern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attacks
(cyberinsider.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 22:00
comments (14)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 22:00
comments (14)
France says Apple notified victims of new spyware attacks
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 21:59
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 21:59
comments (0)
European crypto platform SwissBorg to reimburse users after $41 million theft
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:38
comments (0)
DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:30
comments (0)
Jaguar Land Rover confirms data theft after recent cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:18
comments (0)
Malicious npm Code Reached 10% of Cloud Environments
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:05
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:05
comments (1)
China pilots village surveillance in Solomon Islands in the Pacific, where Chinese police are collecting fingerprints, palm prints to "curb social unrest"
(www.reuters.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Sep 16:31
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Sep 16:31
comments (0)
China pilots village surveillance in Solomon Islands in the Pacific, where Chinese police are collecting fingerprints, palm prints to "curb social unrest"
(www.reuters.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 11 Sep 16:30
comments (2)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 11 Sep 16:30
comments (2)
Nokia CEO calls on EU to remove “high-risk vendors” - specifically China's Huawei and ZTE - from European networks
(coincentral.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (0)
Nokia CEO calls on EU to remove “high-risk vendors” - specifically China's Huawei and ZTE - from European networks
(coincentral.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (12)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (12)
US Senator Wyden pushes FTC to investigate Microsoft for 'gross cybersecurity negligence'
(www.reuters.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 10 Sep 21:48
comments (2)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 10 Sep 21:48
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Sep 16:13
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Sep 16:13
comments (1)
A look at a P2P camera (LookCam app)
(palant.info)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Sep 14:22
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Sep 14:22
comments (0)
Apple: iPhone 17 lineup and iPhone Air come with Memory Integrity Enforcement, which provides always-on memory safety protection
(security.apple.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Sep 13:52
comments (5)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Sep 13:52
comments (5)
Surge in networks scans targeting Cisco ASA devices raise concerns
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:48
comments (0)
45 New Domains Linked to Salt Typhoon, UNC4841
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:40
comments (0)
Georgia Hospital Notifying 163,000 of 2024 Ransomware Hack
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:22
comments (0)
npm debug and chalk packages compromised
(www.aikido.dev)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Sep 17:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Sep 17:47
comments (0)
Plex Media Server: Important Notice of Security Incident
(forums.plex.tv)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 12:37
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 12:37
comments (0)
Graphite, the Israeli spyware acquired by ICE
(english.elpais.com)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 08:03
comments (1)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 08:03
comments (1)
Graphite, the Israeli spyware acquired by ICE
(english.elpais.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 08:03
comments (3)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 08:03
comments (3)
Ex-WhatsApp cybersecurity head says Meta endangered billions of users in new suit
(www.theguardian.com)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
Ex-WhatsApp cybersecurity head says Meta endangered billions of users in new suit
(www.theguardian.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
Largest NPM Compromise in History(Packages With Over 2.6 Billion Total Weekly Downloads) - Supply Chain Attack
(www.aikido.dev)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:56
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:56
comments (0)
LookCam App Users Exposed to Critical Security Risks
(palant.info)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:55
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:55
comments (0)
18 Popular Code Packages Hacked, Rigged to Steal Crypto – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 00:44
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 00:44
comments (0)
Czech cyber agency flags Chinese espionage risks to critical infrastructure
(securityaffairs.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
Czech cyber agency flags Chinese espionage risks to critical infrastructure
(securityaffairs.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
Double trouble with CastleRAT malware, now in C and Python
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Sep 2025 17:26
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Sep 2025 17:26
comments (0)
We Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillance
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 Sep 2025 14:24
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 Sep 2025 14:24
comments (1)
ImaginaryCTF 2025 | September 5-7, 12 PM PDT | a cybersecurity CTF competition with a variety of challenges for all skill levels
(2025.imaginaryctf.org)
in cybersecurity@infosec.pub from otter@lemmy.ca on 05 Sep 2025 20:28
comments (0)
in cybersecurity@infosec.pub from otter@lemmy.ca on 05 Sep 2025 20:28
comments (0)
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 05 Sep 2025 20:10
comments (2)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 05 Sep 2025 20:10
comments (2)
Sextortion with a twist: Spyware takes webcam pics of users watching porn
(arstechnica.com)
in cybersecurity@sh.itjust.works from return2ozma@lemmy.world on 05 Sep 2025 18:47
comments (9)
in cybersecurity@sh.itjust.works from return2ozma@lemmy.world on 05 Sep 2025 18:47
comments (9)
Chess.com confirms data breach
(www.neowin.net)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 2025 18:35
comments (9)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 2025 18:35
comments (9)
Zero-day vulnerability discovered in TP-Link routers
(www.techzine.eu)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 2025 15:03
comments (7)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 2025 15:03
comments (7)
China-aligned crew poisons Windows servers to manipulate Google results
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Sep 2025 10:55
comments (2)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Sep 2025 10:55
comments (2)
Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 05 Sep 2025 05:42
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 05 Sep 2025 05:42
comments (0)
The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest.
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Sep 2025 23:54
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Sep 2025 23:54
comments (3)
AI hacking. Downloading images can allow your computer to be hijacked
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 04 Sep 2025 20:50
comments (3)
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 04 Sep 2025 20:50
comments (3)
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 2025 17:35
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 2025 17:35
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 2025 14:10
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 2025 14:10
comments (1)
My Pixel 10 warned me 8 times in 30-minutes that there was a rogue connection made. Deeply concerning
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 02 Sep 2025 00:26
comments (64)
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 02 Sep 2025 00:26
comments (64)
[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method
(www.usenix.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 2025 19:47
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 2025 19:47
comments (0)
DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally
(www.netscout.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 2025 16:43
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 2025 16:43
comments (0)
Pizza Intelligence - How Pentagon pizza orders correlate with big news
(pizzint.watch)
in cybersecurity@sh.itjust.works from RagnarokOnline@programming.dev on 30 Aug 2025 15:13
comments (7)
in cybersecurity@sh.itjust.works from RagnarokOnline@programming.dev on 30 Aug 2025 15:13
comments (7)
DHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access Federal Emergency Management Agency (FEMA) networks
(www.dhs.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 30 Aug 2025 12:34
comments (10)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 30 Aug 2025 12:34
comments (10)
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 2025 20:05
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 2025 20:05
comments (0)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 19:48
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 19:48
comments (0)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 2025 19:48
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 2025 19:48
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 19:45
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 19:45
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 2025 19:46
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 2025 19:46
comments (0)
Cybersecurity News Review - Week 35 (2025)
(cybernewsweekly.substack.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 18:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 18:47
comments (0)
New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 2025 14:34
comments (2)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 2025 14:34
comments (2)
Two New feeds from CERT-FR integrated in Vulnerability-Lookup
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 13:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 13:47
comments (0)