Pumakit – A Sophisticated Linux Rootkit Attack Critical Infrastructure
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 06:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 06:37
comments (0)
Botnet Unleashes Record-Breaking 5.6Tbps DDoS Attack
(www.pcmag.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jan 21:42
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jan 21:42
comments (0)
50K Fortinet firewalls still vulnerable to latest zero-day
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 21 Jan 19:58
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 21 Jan 19:58
comments (0)
PoC Exploit released for TP-Link Code Execution Vulnerability(CVE-2024-54887)
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (1)
Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:44
comments (0)
Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:43
comments (0)
Bitbucket services “hard down” due to major worldwide outage
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:41
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:41
comments (3)
7-Zip fixes bug that bypasses Windows MoTW security warnings, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 17:28
comments (0)
Russian Ransomware Groups Deploy Email Bombing and Teams Vishing
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:35
comments (0)
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:34
comments (0)
Dangerous new Nnice ransomware laughs at victims by replacing file extensions with ‘.xdddd’
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:33
comments (0)
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (0)
Oracle's January 2025 Critical Patch Update: Addressing 320 Security Vulnerabilities
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:32
comments (1)
Amazon Details Measures to Counter S3 Encryption Hacks
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Jan 12:31
comments (0)
Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities
(www.securityweek.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 19:34
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 19:34
comments (0)
Windows 11 BitLocker-Encrypted Files Accessed Without Disassembling Laptops
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 16:39
comments (1)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 20 Jan 16:39
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Jan 12:30
comments (7)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Jan 12:30
comments (7)
New Microsoft 2FA Bypass Attack Warning—Dangerous And Sneaky
(www.forbes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:05
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:05
comments (2)
Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks
(socprime.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:04
comments (0)
Pumakit - Sophisticated Linux Rootkit That Persist Even After Reboots
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:02
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:02
comments (3)
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:01
comments (0)
Malicious PyPi package steals Discord auth tokens from devs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:00
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 12:00
comments (2)
Hackers Claim Breach of Hewlett Packard Enterprise, Lists Data for Sale
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (1)
Otelier data breach exposes info, hotel reservations of millions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Jan 11:59
comments (0)
ChatGPT crawler flaw opens door to DDoS, prompt injection
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 19 Jan 19:53
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 19 Jan 19:53
comments (0)
Investigating USB-to-Ethernet Dongles With “Malware” Claims
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jan 21:35
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jan 21:35
comments (3)
Cybernotes
(cybernotes.xyz)
in cybersecurity@sh.itjust.works from Wolfie@lemm.ee on 17 Jan 21:32
comments (0)
in cybersecurity@sh.itjust.works from Wolfie@lemm.ee on 17 Jan 21:32
comments (0)
iPhone USB-C is hackable, but users don't need to worry yet
(www.techspot.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 17:57
comments (23)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 17:57
comments (23)
Malware stole internal PowerSchool passwords from engineer's hacked computer
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 17 Jan 17:49
comments (2)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 17 Jan 17:49
comments (2)
AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:30
comments (0)
FCC Adopts Cybersecurity Rules in Wake of Salt Typhoon
(broadbandbreakfast.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 16:29
comments (1)
Top 10 web hacking techniques of 2024: nominations open
(portswigger.net)
in cybersecurity@sh.itjust.works from M33@lemmy.sdf.org on 17 Jan 13:36
comments (1)
in cybersecurity@sh.itjust.works from M33@lemmy.sdf.org on 17 Jan 13:36
comments (1)
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
(blog.sekoia.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:58
comments (0)
MSSqlPwner: Open-source tool for pentesting MSSQL servers
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:46
comments (1)
NSA Warns iPhone And Android Users—Disable Location Tracking
(www.forbes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:42
comments (54)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:42
comments (54)
Wolf Haldenstein law firm says 3.5 million impacted by data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:02
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 12:02
comments (1)
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:59
comments (0)
Chinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reports
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:18
comments (0)
FBI warns agents of call log thefts by hackers, Bloomberg News reports
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:17
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jan 11:17
comments (5)
Bypassing disk encryption on systems with automatic TPM2unlock
(oddlama.org)
in cybersecurity@sh.itjust.works from exu@feditown.com on 17 Jan 10:51
comments (2)
in cybersecurity@sh.itjust.works from exu@feditown.com on 17 Jan 10:51
comments (2)
Microsoft catches Russian state-sponsored hackers shifting tactics to WhatsApp
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:40
comments (0)
Biden administration launches cybersecurity executive order
(www.cnbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:05
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 17:05
comments (1)
FBI Deletes PlugX Malware from Thousands of Computers - Schneier on Security
(www.schneier.com)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 16 Jan 15:18
comments (1)
in cybersecurity@sh.itjust.works from 0x0@programming.dev on 16 Jan 15:18
comments (1)
GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia
(www.imperva.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 13:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 13:51
comments (0)
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:51
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:51
comments (2)
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 12:50
comments (0)
Trusted Apps Sneak a Bug Into UEFI Boot Process
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:56
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:56
comments (2)
AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:55
comments (0)
Hackers leak configs and VPN credentials for 15,000 FortiGate devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:52
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:52
comments (4)
MikroTik botnet uses misconfigured SPF DNS records to spread malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:49
comments (0)
Room for error: European hotel chain exposes millions of guests' data
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
WEF Warns of Growing Cyber Inequity Amid Escalating Complexities
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:47
comments (0)
Cl0p ransom gang says ‘contact us’ or we'll publish data of 59 Cleo victims
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jan 11:46
comments (0)
Operation 99: North Korea’s Cyber Assault on Software Developers
(securityscorecard.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 18:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 18:16
comments (0)
Selfhosted P2P File Transfer & Messaging PWA
in cybersecurity@sh.itjust.works from positive_intentions@lemmy.ml on 15 Jan 15:29
comments (0)
in cybersecurity@sh.itjust.works from positive_intentions@lemmy.ml on 15 Jan 15:29
comments (0)
Chrome 132 Arrives: 16 Security Fixes in Latest Stable Release
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (0)
Millions Stolen: North Korea Hackers Target Blockchain Industry
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:20
comments (1)
WP3.XYZ malware attacks add rogue admins to 5,000+ WordPress sites
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:17
comments (0)
FBI deletes Chinese PlugX malware from thousands of US computers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:14
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jan 12:14
comments (7)
RSYNC: 6 vulnerabilities
(www.openwall.com)
in cybersecurity@sh.itjust.works from thomask@lemmy.sdf.org on 15 Jan 00:42
comments (0)
in cybersecurity@sh.itjust.works from thomask@lemmy.sdf.org on 15 Jan 00:42
comments (0)
Microsoft January 2025 Patch Tuesday
(isc.sans.edu)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:27
comments (0)
Google OAuth flaw lets attackers gain access to abandoned accounts
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 19:26
comments (1)
BusKill (Dead Man Switch) Warrant Canary for 2025 H1
(buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 14 Jan 19:19
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 14 Jan 19:19
comments (0)
BusKill (Dead Man Switch) Warrant Canary for 2025 H1
(buskill.in)
in cybersecurity@sh.itjust.works from buskill@lemmy.sdf.org on 14 Jan 17:57
comments (0)
in cybersecurity@sh.itjust.works from buskill@lemmy.sdf.org on 14 Jan 17:57
comments (0)
US removes malware allegedly planted on computers by Chinese-backed hackers
(www.reuters.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 14 Jan 17:34
comments (3)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 14 Jan 17:34
comments (3)
UK Considers Ban on Ransomware Payments by Public Bodies
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:30
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:30
comments (6)
Hackers use FastHTTP in new high-speed Microsoft 365 password attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:16
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 17:16
comments (3)
Backdooring Your Backdoors - Another $20 Domain, More Governments
(labs.watchtowr.com)
in cybersecurity@sh.itjust.works from exu@feditown.com on 14 Jan 13:17
comments (0)
in cybersecurity@sh.itjust.works from exu@feditown.com on 14 Jan 13:17
comments (0)
Insurance company accused of using secret software to illegally collect and sell location data on millions of Americans
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:55
comments (16)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:55
comments (16)
Critical SAP Flaws Revealed: CVE-2025-0070 and CVE-2025-0066 with CVSS 9.9 Demand Immediate Action
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:50
comments (0)
Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:49
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:49
comments (4)
Linux Kernel Privilege Escalation Vulnerability (CVE-2024-27397) Exploited: PoC Released
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:47
comments (0)
Microsoft: macOS bug lets hackers install malicious kernel drivers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Jan 12:45
comments (1)
New HHS nondiscrimination guidelines on AI use in Healthcare
in cybersecurity@infosec.pub from boatswain@infosec.pub on 13 Jan 21:53
comments (3)
in cybersecurity@infosec.pub from boatswain@infosec.pub on 13 Jan 21:53
comments (3)
38C3 - We've not been trained for this: life after the Newag DRM disclosure [Stream archive; Youtube]
(www.youtube.com)
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 13 Jan 19:47
comments (1)
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 13 Jan 19:47
comments (1)
UK domain registry Nominet confirms breach via Ivanti zero-day
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 18:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 18:26
comments (0)
Ransomware crew abuses AWS native encryption
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:17
comments (0)
EU law enforcement training agency data breach: Data of 97,000 individuals compromised
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 16:15
comments (0)
Phishing Campaigns Exploit YouTube URLs and Microsoft 365 Themes to Steal Credentials
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:41
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:41
comments (2)
NoName057 targets Italy again after Zelensky's visit to the country
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:40
comments (0)
IBM Watsonx.ai Vulnerability Let Attackers Trigger XSS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:38
comments (0)
PoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:37
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:37
comments (1)
Microsoft sues service for creating illicit content with its AI platform
(arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:35
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:35
comments (4)
Meet FunkSec: A New, Surprising Ransomware Group, Powered by AI
(blog.checkpoint.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:34
comments (0)
Chinese hackers breached US government office that assesses foreign investments for national security risks
(edition.cnn.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:32
comments (0)
New Web3 attack exploits transaction simulations to steal crypto
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jan 11:31
comments (0)
Chinese cyber-spies target CFIUS investigations
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 10 Jan 21:54
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 10 Jan 21:54
comments (0)
Telefónica confirms internal ticketing system breach after data leak
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 19:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 19:45
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Jan 16:34
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Jan 16:34
comments (1)
New Gmail Cyber Attack Warning As Private Key Hackers Strike
(www.forbes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:04
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:04
comments (2)
Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:02
comments (0)
Fake LDAPNightmare PoC Exploit Conceals Information-Stealing Malware
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 12:01
comments (0)
2 HIPAA Business Associates Pay HHS Ransomware Settlements
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jan 11:57
comments (0)
Proton Mail still down as Proton recovers from worldwide outage
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 19:17
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 19:17
comments (8)
Chinese Hackers Who Breached US Treasury Were Seeking Sanctions Data, New Developments Suggest
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 13:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 13:40
comments (0)
FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 12:40
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 12:40
comments (10)
Japanese police claim China ran five-year cyberattack
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:28
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:28
comments (1)
Ivanti 0-Day Vulnerability Exploited in Wild-Patch Now
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:20
comments (0)
Russian ISP confirms Ukrainian hackers "destroyed" its network
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:18
comments (0)
New Research Highlights Vulnerabilities in MLOps Platforms
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:17
comments (0)
Scammers Exploit Microsoft 365 to Target PayPal Users
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
macOS Vulnerability CVE-2024-54527 Unveiled: TCC Bypass PoC Exploit Code Released
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jan 11:16
comments (0)
Here’s how hucksters are manipulating Google to promote shady Chrome extensions
(arstechnica.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 09 Jan 00:53
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 09 Jan 00:53
comments (0)
Casio says data of 8,500 people exposed in October ransomware attack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 08 Jan 20:06
comments (3)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 08 Jan 20:06
comments (3)
Over 4,000 backdoors hijacked by registering expired domains
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 18:18
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 18:18
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 08 Jan 17:28
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 08 Jan 17:28
comments (2)
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 14:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 14:55
comments (0)
Phishing Click Rates Triple in 2024
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 12:03
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 12:03
comments (7)
Critical BIOS/UEFI Vulnerabilities Enable Attackers To Overwrite System Firmware
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:47
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:47
comments (3)
Chrome Update Addresses High-Severity Vulnerability: CVE-2025-0291
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:46
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:46
comments (2)
New Mirai botnet targets industrial routers with zero-day exploits
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Jan 11:45
comments (0)
CISA warns of critical Oracle, Mitel flaws exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 18:57
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 18:57
comments (1)
Telegram hands over data on thousands of users to US law enforcement
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 16:20
comments (11)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 16:20
comments (11)
New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:17
comments (0)
CISA says Treasury was the only US agency breached via BeyondTrust
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:15
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:15
comments (1)
Android Security Updates: Patch for Critical RCE Vulnerabilities
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:13
comments (0)
Thousands of SonicWall Devices Remain Vulnerable to CVE-2024-40766
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 14:09
comments (0)
CVE-2024-20154: Critical RCE Flaw in MediaTek Chipsets Impacts Millions
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 12:00
comments (0)
PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 12:00
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 12:00
comments (1)
UN aviation agency investigating reports of possible data breach
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 11:58
comments (0)
Washington sues T-Mobile over 2021 data breach that spilled 79 million customer records
(techcrunch.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 11:57
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Jan 11:57
comments (1)
Microsoft Bing shows misleading Google-like page for 'Google' searches
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 19:54
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 19:54
comments (1)
Chinese Hackers Double Cyber-Attacks on Taiwan
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 19:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 19:48
comments (0)
New AI Jailbreak Method 'Bad Likert Judge' Boosts Attack Success Rates by Over 60%
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:45
comments (0)
Windows 11 BitLocker Bypassed to Extract Encryption Keys
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:05
comments (25)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:05
comments (25)
iPhone Sharing the Photos by Default to Apple
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:03
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:03
comments (6)
Wordpress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:02
comments (0)
Windows 10 users urged to upgrade to avoid "security fiasco"
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:01
comments (56)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:01
comments (56)
ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:00
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 12:00
comments (2)
Apple Offers $95M to Settle Siri Privacy Lawsuit
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 11:59
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 11:59
comments (1)
US sanctions Chinese company linked to Flax Typhoon hackers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 11:58
comments (0)
A Windows filetype update may have complicated cyber threat detection efforts
(www.techradar.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 11:57
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jan 11:57
comments (6)
Nuclei flaw lets malicious templates bypass signature verification
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Jan 11:54
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 05 Jan 11:54
comments (0)
It looks like the Raspberry Pi RP2350 Hacking Challenge has been beaten — Hacker gains access to the OTP secret by glitching the RISC-V cores to enable debugging
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Jan 12:15
comments (5)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Jan 12:15
comments (5)
Bad Tenable plugin updates take down Nessus agents worldwide
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jan 10:45
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jan 10:45
comments (1)
Time to check if you ran any of these 33 malicious Chrome extensions
(arstechnica.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Jan 15:12
comments (6)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 03 Jan 15:12
comments (6)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Jan 14:43
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Jan 14:43
comments (0)
LDAPNightmare: SafeBreach Publishes First PoC Exploit (CVE-2024-49113)
(www.safebreach.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jan 16:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Jan 16:41
comments (0)
🎶 For Secured Times Gone By 🎶
in cybersecurity@infosec.pub from coolboole@infosec.pub on 31 Dec 19:03
comments (0)
in cybersecurity@infosec.pub from coolboole@infosec.pub on 31 Dec 19:03
comments (0)
7-Zip Zero-Day Exploit Allegedly Leaked Online
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 19:08
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 19:08
comments (3)
Hackers hijack a wide range of companies' Chrome extensions, experts say
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:58
comments (0)
Cyber attack on Italy's Foreign Ministry, airports claimed by pro-Russian hacker group
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:57
comments (0)
Japan Airlines systems back to normal after cyberattack delayed flights
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:56
comments (0)
Severe Vulnerability in Palo Alto Networks PAN-OS Exposes Firewalls to Denial of Service (CVE-2024-3393)
(socradar.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:54
comments (0)
North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:53
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:53
comments (0)
FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:52
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:52
comments (0)
16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:50
comments (11)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Dec 11:50
comments (11)
The US proposes rules to make healthcare data more secure
(www.theverge.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 29 Dec 08:55
comments (6)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 29 Dec 08:55
comments (6)
VW Suffers Major Breach Exposing Location of 800,000 Electric Vehicles
(cyberinsider.com)
in cybersecurity@sh.itjust.works from minyaen@lemmy.ml on 27 Dec 20:05
comments (26)
in cybersecurity@sh.itjust.works from minyaen@lemmy.ml on 27 Dec 20:05
comments (26)
Texas awards $170M contract to SAIC for IT, cybersecurity services | StateScoop
(statescoop.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 27 Dec 19:58
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 27 Dec 19:58
comments (1)
Integrating Wazuh with DefectDojo for DevSecOps
(wazuh.com)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 25 Dec 18:09
comments (0)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 25 Dec 18:09
comments (0)
VPN used for VR game cheat sells access to your home network
(arstechnica.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 25 Dec 18:05
comments (9)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 25 Dec 18:05
comments (9)
Conversation with a “Nam3L3ss” Watchdog: Preface
(databreaches.net)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 24 Dec 04:33
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 24 Dec 04:33
comments (0)
Cloud Atlas using a new backdoor, VBCloud, to steal data
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 19:40
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 19:40
comments (0)
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces
(news.sophos.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 17:13
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 17:13
comments (0)
Suspected LockBit dev faces extradition to the US
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Dec 14:45
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 23 Dec 14:45
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Dec 14:09
comments (6)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Dec 14:09
comments (6)
The Fraudster Glossary
(fraudsterglossary.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 13:11
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 13:11
comments (0)
Top 5 Ransomware Attacks and Data Breaches of 2024 - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:12
comments (0)
Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (0)
BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:11
comments (2)
NotLockBit: New Cross-Platform Ransomware Threatens Windows and macOS
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:10
comments (0)
US hospital operator Ascension says 5.6 million affected in medical data breach in May
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:08
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:08
comments (4)
North Korean hackers stole $1.3 billion worth of crypto this year
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:07
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Dec 12:07
comments (2)
DigiEver Fix That IoT Thing!
(www.akamai.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 10:46
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 10:46
comments (1)
Development Platform Builder.ai Exposed Over 1.2 TB of Data Containing More Than 3 Million Records
(www.websiteplanet.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Dec 2024 10:42
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Dec 2024 10:42
comments (0)
Kaspersky discovers C++ version of BellaCiao malware
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 21:22
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 21:22
comments (1)
United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 17:12
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 17:12
comments (0)
Foxit PDF Editor Vulnerabilities Allows Remote Code Execution
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:08
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:08
comments (3)
Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:08
comments (0)
Python-Based NodeStealer Version Targets Facebook Ads Manager
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:06
comments (0)
Lazarus targets nuclear-related organization with new malware
(securelist.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:06
comments (0)
New Malware Can Kill Engineering Processes in ICS Environments
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:04
comments (0)
Rising wave of cyber-attacks targeting YouTube content creators
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:04
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:04
comments (4)
Ransomware Attackers Target Industries with Low Downtime Tolerance
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Dec 2024 14:02
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Dec 2024 13:48
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Dec 2024 13:48
comments (2)
Lazarus targets nuclear-related organization with new malware
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 13:10
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 13:10
comments (0)
Deobfuscation of Lumma Stealer
(ryan-weil.github.io)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 08:23
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 08:23
comments (0)
Romanian National Sentenced to 20 Years in Prison in Connection with NetWalker Ransomware Attacks Resulting in the Payment of Millions of Dollars in Ransoms
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 00:22
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 00:22
comments (0)
I’m Lovin’ It: Exploiting McDonald’s APIs to hijack deliveries and order food for a penny
(eaton-works.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 22:20
comments (3)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 22:20
comments (3)
CERT-UA: Russia-linked UAC-0125 abuses Cloudflare Workers to target Ukrainian army
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:18
comments (0)
BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:12
comments (0)
CISA Releases Draft of National Cyber Incident Response Plan
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:09
comments (0)
Fortinet warns of FortiWLM bug giving hackers admin privileges
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:08
comments (0)
Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 18:01
comments (0)
Okta Social Engineering Impersonation Report - Response and Recommendation
(sec.okta.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 13:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 13:24
comments (0)
BeyondTrust Patches Critical Vulnerability Discovered During Security Incident Probe
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:27
comments (0)
CISA Releases Best Practice Guidance for Mobile Communications
(www.cisa.gov)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:13
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:13
comments (3)
Thousands of users in Europe getting malicious emails with DocuSign-enabled PDFs
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:12
comments (0)
US considers banning TP-Link routers over cybersecurity risks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:02
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:02
comments (8)
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Dec 2024 12:01
comments (0)
Python-Based NodeStealer Version Targets Facebook Ads Manager
(www.trendmicro.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 10:01
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 10:01
comments (0)
BADBOX Botnet Is Back
(www.bitsight.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 09:51
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 09:51
comments (0)
Effective Phishing Campaign Targeting European Companies and Institutions
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:51
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:51
comments (0)
C.A.S hacktivists attack Russian organizations using rare RATs
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:39
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:39
comments (1)
Hackers Exploiting Linux eBPF Tech to Spread Malware in Ongoing Campaign
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 17:50
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 17:50
comments (2)
Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:27
comments (0)
Xloader Malware Delivered via Sophisticated SharePoint Attack
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:25
comments (0)
RCE and DoS Vulnerabilities Addressed in Apache Tomcat: CVE-2024-50379 and CVE-2024-54677
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:24
comments (0)
CISA orders federal agencies to secure Microsoft 365 tenants
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Dec 2024 13:22
comments (0)