North Korean hackers target Python devs with malware disguised as coding tests — hack has been underway for a year
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Sep 15:07
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Sep 15:07
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Sep 14:25
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Sep 14:25
comments (1)
Citrix Workspace App Vulnerable to Privilege Escalation Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Sep 12:05
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Sep 12:05
comments (7)
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Sep 12:03
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Sep 12:03
comments (2)
New Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwide
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 19:15
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 19:15
comments (1)
Transport for London confirms customer data stolen in cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 19:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 19:13
comments (0)
Fortinet confirms data breach after hacker claims to steal 440GB of files
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 19:13
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 19:13
comments (7)
data was exfiltrated from a corp I did not even know had my data; then they offer to have a privacy abuser (Cloudflare) MitM credit monitoring txns. WTF?
in cybersecurity@infosec.pub from soloActivist@links.hackliberty.org on 12 Sep 15:56
comments (0)
in cybersecurity@infosec.pub from soloActivist@links.hackliberty.org on 12 Sep 15:56
comments (0)
Amateurish 'CosmicBeetle' Ransomware Stings Turkish SMBs
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 10:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Sep 10:55
comments (0)
Apple Vision Pro’s Eye Tracking Exposed What People Type
(www.wired.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 12 Sep 10:26
comments (11)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 12 Sep 10:26
comments (11)
As quantum computing threats loom, Microsoft updates its core crypto library
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 12 Sep 05:32
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 12 Sep 05:32
comments (2)
Quad7 botnet evolves to more stealthy tactics to evade detection
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:31
comments (0)
New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:30
comments (1)
Microsoft Discloses 4 Zero-Days in September Update
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:29
comments (0)
DockerSpy: Search for images on Docker Hub, extract sensitive information - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:28
comments (0)
Rogue WHOIS server gives researcher superpowers no one should ever have
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:25
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 11:25
comments (2)
Bug Left Some Windows PCs Dangerously Unpatched
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Sep 02:29
comments (3)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Sep 02:29
comments (3)
New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 17:02
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 17:02
comments (4)
Microsoft to start force-upgrading Windows 22H2 systems next month
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 16:59
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 16:59
comments (3)
Poland thwarted cyberattacks that were carried out by Russia and Belarus
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 13:02
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 13:02
comments (1)
New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 10:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 10:25
comments (1)
Threat Actors Allegedly Claiming Leak of Capgemini Data
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 10:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 10:23
comments (0)
U.S. CISA adds SonicWall SonicOS, ImageMagick and Linux Kernel bugs to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 10:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 10:22
comments (0)
Predator spyware operation is back with a new infrastructure
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 21:53
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 21:53
comments (0)
New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 21:52
comments (17)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 21:52
comments (17)
300K Victims Compromised in Avis Car Rental Breach
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 21:51
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 21:51
comments (2)
Meta fixes easily bypassed WhatsApp ‘View Once’ privacy feature
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:22
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:22
comments (1)
TIDRONE APT targets drone manufacturers in Taiwan
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:21
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:21
comments (0)
Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:20
comments (1)
FreeBSD Gets €686,400 to Boost Security Features
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 07 Sep 22:51
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 07 Sep 22:51
comments (2)
Found: 280 Android apps that use OCR to steal cryptocurrency credentials
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 06 Sep 23:21
comments (3)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 06 Sep 23:21
comments (3)
Critical Security Flaw Found in LiteSpeed Cache Plugin for WordPress
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:35
comments (0)
Chinese 'Tropic Trooper' APT Targets Mideast Governments
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:32
comments (1)
SonicWall Access Control Vulnerability Exploited in the Wild
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:31
comments (0)
Russia APT28 Cyber Attacks German Air Traffic Control
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 12:29
comments (1)
Zyxel warns of vulnerabilities in a wide range of its products
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Sep 16:56
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Sep 16:56
comments (0)
Iran pays millions to stop data leak related to banks
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Sep 12:11
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Sep 12:11
comments (1)
Cisco warns of backdoor admin account in Smart Licensing Utility
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Sep 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Sep 12:09
comments (0)
Where's a good place to look for entry-level GRC jobs?
in cybersecurity@sh.itjust.works from hellofriend@lemmy.world on 05 Sep 09:29
comments (9)
in cybersecurity@sh.itjust.works from hellofriend@lemmy.world on 05 Sep 09:29
comments (9)
DDoS Attacks Hit France Over Telegram's Pavel Durov Arrest
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 17:51
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 17:51
comments (2)
Hackers inject malicious JS in Cisco store to steal credit cards, credentials
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Sep 16:52
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Sep 16:52
comments (1)
Thousands of abandoned PyPI projects could be hijacked: Report
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Sep 16:51
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Sep 16:51
comments (0)
Sanity check: Yubikeys and password shares
in cybersecurity@sh.itjust.works from Telorand@reddthat.com on 04 Sep 15:56
comments (13)
in cybersecurity@sh.itjust.works from Telorand@reddthat.com on 04 Sep 15:56
comments (13)
White House publishes latest plan to protect a key component of the internet: BGP
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 11:48
comments (0)
PoC Exploit Released For 0-Day Windows Kernel Privilege Escalation Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 11:40
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 11:40
comments (3)
Record breaking Ransomware attacks on Schools and Colleges in 2023
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 11:35
comments (0)
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 20:12
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 20:12
comments (3)
FBI: North Korea Aggressively Targeting Crypto Industry with Well-Disguised Social Engineering Attacks
(www.ic3.gov)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 18:19
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 18:19
comments (1)
List of Old NSA Training Videos
(www.schneier.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Sep 16:42
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Sep 16:42
comments (2)
Halliburton confirms data stolen in recent cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 16:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 16:24
comments (0)
NASA Focuses on Cybersecurity of Its Mission-Critical Software
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Sep 12:58
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Sep 12:58
comments (1)
Hacker Leaks Data of 390 Million Users from VK, a Russian Social Network
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 12:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Sep 12:06
comments (0)
[Opinion] Cloud providers must own up to their part in the current state of insecurity
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Sep 10:24
comments (4)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Sep 10:24
comments (4)
SQL Injection Attack on Airport Security
(www.schneier.com)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 03 Sep 08:23
comments (16)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 03 Sep 08:23
comments (16)
Transport for London cyberattack?
in cybersecurity@sh.itjust.works from dch82@lemmy.zip on 02 Sep 18:43
comments (4)
in cybersecurity@sh.itjust.works from dch82@lemmy.zip on 02 Sep 18:43
comments (4)
If you had to access an unfamiliar flash drive (or other data storage), what safety precautions would you take?
in cybersecurity@sh.itjust.works from ALostInquirer@lemm.ee on 02 Sep 18:42
comments (29)
in cybersecurity@sh.itjust.works from ALostInquirer@lemm.ee on 02 Sep 18:42
comments (29)
.NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents
(gbhacke1.txpro1.fcomet.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 18:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 18:29
comments (0)
Business services giant CBIZ discloses customer data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 18:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 18:29
comments (0)
GitHub comments abused to push password stealing malware masked as fixes
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 12:00
comments (0)
Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systems
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:58
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:58
comments (4)
Durex India data breach leaks sensitive details of customers
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:57
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:57
comments (2)
Cicada3301 ransomware’s Linux encryptor targets VMware ESXi systems
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:56
comments (0)
North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Sep 11:51
comments (0)
5G in Australia or Malaysia - who did it better?
(water.house)
in cybersecurity@sh.itjust.works from jack@water.house on 01 Sep 13:08
comments (0)
in cybersecurity@sh.itjust.works from jack@water.house on 01 Sep 13:08
comments (0)
Researchers find SQL injection to bypass airport TSA security checks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 31 Aug 10:24
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 31 Aug 10:24
comments (0)
'Voldemort' Malware Curses Orgs Using Global Tax Authorities
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 31 Aug 10:24
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 31 Aug 10:24
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Aug 13:41
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Aug 13:41
comments (3)
Brain Cipher claims cyberattack on Olympic venue
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:46
comments (0)
Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day
(www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:46
comments (1)
FBI: RansomHub ransomware breached 210 victims since February
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:44
comments (0)
North Korean Hackers Launch New Wave of npm Package Attacks
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:42
comments (0)
Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Tool
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Aug 11:37
comments (0)
Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 30 Aug 06:41
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 30 Aug 06:41
comments (0)
Attack tool update impairs Windows computers
(news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Aug 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Aug 11:38
comments (0)
New Tickler malware used to backdoor US govt, defense orgs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:29
comments (3)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:29
comments (3)
Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:28
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:28
comments (1)
Google increases Chrome bug bounty rewards up to $250,000
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:27
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:27
comments (0)
Hitachi Energy Vulnerabilities Plague SCADA Power Systems
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:24
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:24
comments (0)
Bug bounty programs take root in Russia — with possible far-reaching implications
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:21
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 23:21
comments (0)
Unpatchable 0-day in surveillance cam is being exploited to install Mirai
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 22:37
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 28 Aug 22:37
comments (2)
New LummaC2 Malware Variant Uses PowerShell, Obfuscation to Steal Data
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 16:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 16:58
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Aug 13:10
comments (7)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Aug 13:10
comments (7)
BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 13:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 13:05
comments (0)
Largest Healthcare Data Breaches of 2023
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:56
comments (0)
PoC Exploit for Zero-Click Vulnerability Made Available to the Masses
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:20
comments (0)
Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:16
comments (0)
‘ASCII Smuggling’ attack exposes sensitive Microsoft Copilot data
(www.scmagazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 Aug 12:14
comments (0)
PSA: Github currently has spambot/ malware links problem.
in cybersecurity@sh.itjust.works from True@lemy.lol on 28 Aug 11:41
comments (19)
in cybersecurity@sh.itjust.works from True@lemy.lol on 28 Aug 11:41
comments (19)
Critical WPML Plugin Flaw Exposes WordPress Sites to Remote Code Execution
(thehackernews.com)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 28 Aug 10:21
comments (1)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 28 Aug 10:21
comments (1)
China's Volt Typhoon Exploits 0-day in Versa's SD-WAN Director Servers
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 18:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 18:51
comments (0)
Microsoft Sway abused in massive QR code phishing campaign
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 27 Aug 15:34
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 27 Aug 15:34
comments (0)
NTLM Credential Theft Risk in Python Apps Threaten Windows Security
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:14
comments (0)
Hackers Use Rare Stealth Techniques to Down Asian Military, Gov't Orgs
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:10
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:10
comments (1)
Seattle-Tacoma Airport IT systems down due to a cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:09
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:09
comments (3)
Group Offers CAPTCHA-Solving Services to Cybercriminals
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Aug 12:03
comments (0)
Stealthy 'sedexp' Linux malware evaded detection for two years
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 27 Aug 09:33
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 27 Aug 09:33
comments (0)
Hackers Claim to Have Stolen Top Secret Documents From the U.S. Marshals Service
(gizmodo.com)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 27 Aug 07:10
comments (1)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 27 Aug 07:10
comments (1)
Is wpa3 reccomended on a home network?
in cybersecurity@sh.itjust.works from yokonzo@lemmy.world on 27 Aug 03:52
comments (16)
in cybersecurity@sh.itjust.works from yokonzo@lemmy.world on 27 Aug 03:52
comments (16)
[Question] best way to check an unknown external drive relatively safely on Windows 10?
in cybersecurity@sh.itjust.works from can@sh.itjust.works on 26 Aug 22:02
comments (2)
in cybersecurity@sh.itjust.works from can@sh.itjust.works on 26 Aug 22:02
comments (2)
Android malware steals payment card data using previously unseen technique
(arstechnica.com)
in cybersecurity@sh.itjust.works from return2ozma@lemmy.world on 26 Aug 18:00
comments (0)
in cybersecurity@sh.itjust.works from return2ozma@lemmy.world on 26 Aug 18:00
comments (0)
Some interesting ways consoles are hacked
(www.xda-developers.com)
in cybersecurity@sh.itjust.works from yokonzo@lemmy.world on 26 Aug 13:30
comments (0)
in cybersecurity@sh.itjust.works from yokonzo@lemmy.world on 26 Aug 13:30
comments (0)
Iranian Hackers Targeted WhatsApp Accounts of Staffers in Biden, Trump Administrations, Meta Says
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 12:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 12:20
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Aug 11:56
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Aug 11:56
comments (3)
Hackers now use AppDomain Injection to drop CobaltStrike beacons
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:33
comments (0)
India's Critical Infrastructure Suffers Spike in Cyberattacks
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:20
comments (0)
American Radio Relay League Paid $1 Million Ransom
(virtualattacks.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:18
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:18
comments (4)
Stealthy 'sedexp' Linux malware evaded detection for two years
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:17
comments (1)
India's Critical Infrastructure Suffers Spike in Cyberattacks
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:15
comments (0)
Former Verizon employee pleads guilty to conspiring to aid Chinese spy agency
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:14
comments (0)
Russian laundering millions for Lazarus hackers arrested in Argentina
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Aug 10:13
comments (0)
After cybersecurity lab wouldn’t use AV software, US accuses Georgia Tech of fraud
(arstechnica.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 26 Aug 00:37
comments (15)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 26 Aug 00:37
comments (15)
Email Security for Every Taste
(loudwhisper.me)
in cybersecurity@sh.itjust.works from loudwhisper@infosec.pub on 24 Aug 23:20
comments (0)
in cybersecurity@sh.itjust.works from loudwhisper@infosec.pub on 24 Aug 23:20
comments (0)
NGate Android malware relays NFC traffic to steal cash
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 Aug 13:52
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 Aug 13:52
comments (0)
Local Networks Go Global When Domain Names Collide
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 24 Aug 04:16
comments (13)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 24 Aug 04:16
comments (13)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Aug 13:49
comments (10)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Aug 13:49
comments (10)
New macOS Malware "Cthulhu Stealer" Targets Apple Users' Data
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:41
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:41
comments (3)
Google Chrome Update Fixes Flaw Exploited in the Wild
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:39
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:39
comments (1)
Qilin ransomware now steals credentials from Chrome browsers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:37
comments (0)
Two Years On, Log4Shell Vulnerability Still Being Exploited to Deploy Malware
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Aug 12:34
comments (0)
Roast the security of my app
in cybersecurity@infosec.pub from positive_intentions@lemmy.ml on 22 Aug 15:01
comments (3)
in cybersecurity@infosec.pub from positive_intentions@lemmy.ml on 22 Aug 15:01
comments (3)
Top US oilfield firm Halliburton hit by cyberattack, source says
(www.reuters.com)
in cybersecurity@sh.itjust.works from borari@lemmy.dbzer0.com on 22 Aug 13:57
comments (2)
in cybersecurity@sh.itjust.works from borari@lemmy.dbzer0.com on 22 Aug 13:57
comments (2)
Experts disclosed a critical information-disclosure flaw in Microsoft Copilot Studio
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 13:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 13:10
comments (0)
Hacker leaks upcoming episodes of Netflix shows online following security breach
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:58
comments (20)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:58
comments (20)
CVE-2024-7272: Critical Heap Overflow Vulnerability Discovered in FFmpeg, PoC Published
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:55
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:55
comments (3)
New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining
(thehackernews.com)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 22 Aug 09:06
comments (0)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 22 Aug 09:06
comments (0)
Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access
(thehackernews.com)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 22 Aug 09:04
comments (0)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 22 Aug 09:04
comments (0)
Novel technique allows malicious apps to escape iOS and Android guardrails
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 21 Aug 20:58
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 21 Aug 20:58
comments (0)
Iranian cyberespionage group deploys new BlackSmith malware in sophisticated spear-phishing campaign
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 21 Aug 19:58
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 21 Aug 19:58
comments (0)
Slack AI can leak private data via prompt injection
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 21 Aug 19:32
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 21 Aug 19:32
comments (2)
Russia tells citizens to switch off home surveillance because the Ukrainians are coming
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 17:13
comments (11)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 17:13
comments (11)
North Korean Hackers Deploy New MoonPeak Trojan in Cyber Campaign
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 17:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 17:12
comments (0)
GitHub Enterprise Server vulnerable to critical auth bypass flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 17:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 17:07
comments (0)
Hackers use PHP exploit to backdoor Windows systems with new malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:32
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:32
comments (5)
Average DDoS attack costs $6,000 per minute (to the victim)
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:31
comments (0)
Hackers target bank clients in Czechia, Hungary and Georgia in novel phishing campaign
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:24
comments (0)
Pro-Russia group Vermin targets Ukraine with a new malware family
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Aug 11:24
comments (0)
GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk
(thehackernews.com)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 21 Aug 09:55
comments (0)
in cybersecurity@sh.itjust.works from AmbiguousProps@lemmy.today on 21 Aug 09:55
comments (0)
Chipmaker Microchip reveals cyber attack
(www.theregister.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 21 Aug 06:20
comments (0)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 21 Aug 06:20
comments (0)
Data Exfiltration from Slack AI via indirect prompt injection
(promptarmor.substack.com)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 20 Aug 21:03
comments (1)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 20 Aug 21:03
comments (1)
Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds
(www.techrepublic.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 19:41
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 19:41
comments (3)
Phrack Magazine Issue 71
(phrack.org)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 20 Aug 14:10
comments (0)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 20 Aug 14:10
comments (0)
Toyota confirms breach after stolen data leaks on hacking forum
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 11:37
comments (0)
Critical Jenkins vulnerability added to CISA’s known vulnerabilities catalog
(www.scmagazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 11:35
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 11:35
comments (1)
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 11:32
comments (0)
CVE-2024-38213: Copy2Pwn Exploit Evades Windows Web Protections
(www.zerodayinitiative.com)
in cybersecurity@sh.itjust.works from BodaciousMunchkin@links.hackliberty.org on 20 Aug 10:11
comments (0)
in cybersecurity@sh.itjust.works from BodaciousMunchkin@links.hackliberty.org on 20 Aug 10:11
comments (0)
apps .. repo or not
(m.krbonne.net)
in cybersecurity@infosec.pub from kristoff@infosec.pub on 20 Aug 06:15
comments (11)
in cybersecurity@infosec.pub from kristoff@infosec.pub on 20 Aug 06:15
comments (11)
Windows 0-day was exploited by North Korea to install advanced rootkit
(arstechnica.com)
in cybersecurity@sh.itjust.works from MrSoup@lemmy.zip on 20 Aug 05:46
comments (0)
in cybersecurity@sh.itjust.works from MrSoup@lemmy.zip on 20 Aug 05:46
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Aug 12:54
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Aug 12:54
comments (0)
RansomHub-linked EDR-killing malware spotted in the wild
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Aug 18:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Aug 18:39
comments (0)
New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Aug 18:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Aug 18:38
comments (0)
FlightAware configuration error leaked user data for years
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Aug 18:36
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Aug 18:36
comments (4)
Windows Critical Vulnerability: CVE-2024-38063
(www.cybermaxx.com)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 19 Aug 14:45
comments (4)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 19 Aug 14:45
comments (4)
AWS environments compromised through exposed .env files
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 19 Aug 02:19
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 19 Aug 02:19
comments (0)
GitHub rolls out AI-powered fixes for code vulnerabilities
(www.infoworld.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 18 Aug 02:40
comments (4)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 18 Aug 02:40
comments (4)
Question about Cyberark and it's link to Israël
in cybersecurity@sh.itjust.works from cyborganism@lemmy.ca on 16 Aug 15:01
comments (1)
in cybersecurity@sh.itjust.works from cyborganism@lemmy.ca on 16 Aug 15:01
comments (1)
What if someone creates a clone of my app for phishing?
in cybersecurity@sh.itjust.works from positive_intentions@lemmy.ml on 16 Aug 12:06
comments (1)
in cybersecurity@sh.itjust.works from positive_intentions@lemmy.ml on 16 Aug 12:06
comments (1)
How does one protect themselves from BYOVD attacks?
in cybersecurity@sh.itjust.works from yokonzo@lemmy.world on 16 Aug 01:22
comments (4)
in cybersecurity@sh.itjust.works from yokonzo@lemmy.world on 16 Aug 01:22
comments (4)
Ransomware gang deploys new malware to kill security software
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 15 Aug 21:13
comments (4)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 15 Aug 21:13
comments (4)
Microsoft disables BitLocker security fix, advises manual mitigation
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 15 Aug 21:13
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 15 Aug 21:13
comments (0)
SolarWinds: Critical RCE Bug Requires Urgent Patch
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 15 Aug 21:11
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 15 Aug 21:11
comments (1)
China-linked Attackers Target Russian Govt Entities
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Aug 11:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Aug 11:32
comments (1)
A massive cyber attack hit Central Bank of Iran
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Aug 11:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Aug 11:32
comments (1)
Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 22:43
comments (9)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 22:43
comments (9)
GitHub Actions artifacts found leaking auth tokens in popular projects
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 22:40
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 22:40
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Aug 18:55
comments (6)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Aug 18:55
comments (6)
Cybersecurity Flaws Could Derail High-profile Cycling Races
(today.ucsd.edu)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 14 Aug 18:26
comments (2)
in cybersecurity@sh.itjust.works from pnutzh4x0r@lemmy.ndlug.org on 14 Aug 18:26
comments (2)
Israeli contractor claims Israel is behind rigging elections and online bot farms.Not China, not russia, not iran.They claim Israel has rigged more than 30 elections
(x.com)
in cybersecurity@infosec.pub from europathelastbattle@infosec.pub on 14 Aug 16:23
comments (2)
in cybersecurity@infosec.pub from europathelastbattle@infosec.pub on 14 Aug 16:23
comments (2)
[Opinion] Cybersecurity should return to reality and ditch the hype
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:54
comments (4)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:54
comments (4)
Mitre, Microsoft differ on how severe MS Office flaw really is
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:53
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:53
comments (0)
Critical Ivanti vTM Bug Allows Unauthorized Admin Access
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:51
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:51
comments (0)
The nation’s best hackers found vulnerabilities in voting machines — but no time to fix them
(www.politico.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:21
comments (9)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 14 Aug 2024 13:21
comments (9)
Any recommendations against Sinkclose on older CPUs?
in cybersecurity@sh.itjust.works from kenkenken@fedia.io on 14 Aug 2024 12:57
comments (2)
in cybersecurity@sh.itjust.works from kenkenken@fedia.io on 14 Aug 2024 12:57
comments (2)
Microsoft Azure AI Health Bot Infected With Critical Vulnerabilities
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:39
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:39
comments (1)
DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:38
comments (0)
Critical SAP flaw allows remote attackers to bypass authentication
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:27
comments (0)
NIST Formalizes World's First Post-Quantum Cryptography Standards
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:15
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 2024 12:15
comments (2)
Patch Tuesday brings 90 new Microsoft CVEs, six already under exploit
(www.theregister.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 14 Aug 2024 05:23
comments (0)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 14 Aug 2024 05:23
comments (0)
DARPA Aims to Ditch C Code, Move to Rust
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 14:43
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 14:43
comments (1)
35% of exposed API keys still active, posing major security risks
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:38
comments (0)
PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:19
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:19
comments (7)
Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources
(www.aquasec.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:12
comments (0)
FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:10
comments (0)
FBI disrupts the Dispossessor ransomware operation, seizes servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:33
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:33
comments (0)
UN Approves Cybercrime Treaty Despite Major Tech, Privacy Concerns
(www.darkreading.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:32
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:32
comments (1)
South Korea says DPRK hackers stole spy plane technical data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:32
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:32
comments (1)
Hackers posing as Ukraine’s Security Service infect 100 govt PCs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:31
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:31
comments (0)
AMD addresses Sinkclose vulnerability but older processors left unattended
(www.csoonline.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:29
comments (13)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 13 Aug 2024 08:29
comments (13)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Aug 2024 12:02
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Aug 2024 12:02
comments (3)
Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:54
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:54
comments (1)
Microsoft discloses unpatched Office flaw that exposes NTLM hashes
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:42
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:42
comments (2)
Hackers leak 2.7 billion data records with Social Security numbers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:41
comments (1)
Researchers Uncover 10 Flaws in Google's File Transfer Tool Quick Share
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:37
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2024 11:37
comments (1)
Chinese hacking groups target Russian government, IT firms
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Aug 2024 22:59
comments (5)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Aug 2024 22:59
comments (5)
Scaling Variant Analysis // Going Beyond Grep
(goingbeyondgrep.com)
in cybersecurity@infosec.pub from fcano@infosec.pub on 11 Aug 2024 11:01
comments (0)
in cybersecurity@infosec.pub from fcano@infosec.pub on 11 Aug 2024 11:01
comments (0)
Black Hat USA 2024 | Briefings Schedule
(www.blackhat.com)
in cybersecurity@infosec.pub from fcano@infosec.pub on 11 Aug 2024 10:56
comments (0)
in cybersecurity@infosec.pub from fcano@infosec.pub on 11 Aug 2024 10:56
comments (0)
What lies beneath: the growing threat to the hidden network of cables that power the internet
(www.theguardian.com)
in cybersecurity@sh.itjust.works from gytrash@feddit.uk on 10 Aug 2024 13:46
comments (9)
in cybersecurity@sh.itjust.works from gytrash@feddit.uk on 10 Aug 2024 13:46
comments (9)
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
(www.wired.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 10 Aug 2024 09:12
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 10 Aug 2024 09:12
comments (0)
Malware force-installs Chrome extensions on 300,000 browsers, patches DLLs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 10 Aug 2024 09:09
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 10 Aug 2024 09:09
comments (2)
Signal Developer Explains Why Early Encrypted Messaging Tools Flopped
(www.pcmag.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 10 Aug 2024 05:21
comments (9)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 10 Aug 2024 05:21
comments (9)
New AMD SinkClose flaw helps install nearly undetectable malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from DocMcStuffin@lemmy.world on 10 Aug 2024 02:15
comments (20)
in cybersecurity@sh.itjust.works from DocMcStuffin@lemmy.world on 10 Aug 2024 02:15
comments (20)