Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Mar 22:08
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Mar 22:08
comments (0)
Experts doubt Oracle's breach denial as inside data emerges
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Mar 21:43
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Mar 21:43
comments (0)
Chinese Weaver Ant hackers spied on telco network for 4 years
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 25 Mar 17:10
comments (1)
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 25 Mar 17:10
comments (1)
A Sneaky Phish Just Grabbed my Mailchimp Mailing List
(www.troyhunt.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 25 Mar 09:10
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 25 Mar 09:10
comments (2)
Public-facing Kubernetes clusters at risk of total takeover
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 25 Mar 03:50
comments (7)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 25 Mar 03:50
comments (7)
New Phishing Campaign Targets macOS Users with Fake Security Alerts
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:36
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:36
comments (3)
Linux kernel Rust module for rootkit detection
(blog.thalium.re)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:24
comments (0)
Cyberattack takes down Ukrainian state railway’s online services
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:19
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 19:19
comments (1)
FBI warnings are true—fake file converters do push malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 Mar 17:48
comments (3)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 Mar 17:48
comments (3)
New SvcStealer Malware Attacking Users To Steal Sensitive Data From Browsers & Apps
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
New VanHelsingRaaS Attacking Linux, BSD, ARM, and ESXi Systems
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:02
comments (0)
VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:01
comments (0)
Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 17:00
comments (0)
Cloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systems
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:58
comments (0)
Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 16:56
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Mar 14:34
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Mar 14:34
comments (0)
Steampipe: How to secure API credentials?
in cybersecurity@sh.itjust.works from _synack@sh.itjust.works on 24 Mar 14:04
comments (10)
in cybersecurity@sh.itjust.works from _synack@sh.itjust.works on 24 Mar 14:04
comments (10)
Nation-State 'Paragon' Spyware Infections Target Civil Society
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
Coinbase was primary target of recent GitHub Actions breaches
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 12:07
comments (0)
Cloudflare now blocks all unencrypted traffic to its API endpoints
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:55
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:55
comments (2)
Microsoft Trusted Signing service abused to code-sign malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:51
comments (0)
Next.js and the corrupt middleware: the authorizing artifact
(zhero-web-sec.github.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:50
comments (0)
Cybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaign
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:49
comments (0)
Oracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Mar 11:48
comments (0)
Steam pulls game demo infecting Windows with info-stealing malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Mar 03:30
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Mar 03:30
comments (1)
Web Shell to Ransomware: New VMware Attack Vector Exposed by Sygnia
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:50
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:50
comments (2)
RansomHub affiliate uses custom backdoor Betruger
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 19:49
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Mar 12:37
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Mar 12:37
comments (2)
CVE-2025-0755: MongoDB C Driver Vulnerability Could Lead to Buffer Overflow
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
LayerX Labs Identifies New Phishing Campaign Targeted at Mac Users - LayerX
(layerxsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
WhatsApp fixed zero-day used to deploy Paragon Graphite spyware
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:43
comments (0)
Operation FishMedley targeting governments, NGOs, and think tanks
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:42
comments (0)
Rooted Androids 3,000x More Likely to Be Breached, Even iPhones Not Safe
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:41
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:41
comments (2)
Veeam RCE bug lets domain users hack backup servers, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 Mar 11:40
comments (0)
U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:11
comments (0)
PoC Released: Windows Explorer CVE-2025-24071 Vulnerability Exposes NTLM Hashes
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:05
comments (0)
UK urges critical orgs to adopt quantum cryptography by 2035
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:04
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 17:04
comments (4)
HTTP Flaw in Apple’s Passwords App Left iPhone Users Vulnerable to Phishing for Over 3 Years
(techoreon.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
HellCat hackers go on a worldwide Jira hacking spree
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 16:15
comments (0)
Infosys Settles $17.5M Class Action Lawsuit After Sprawling Third-Party Breach
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:09
comments (0)
Pennsylvania education union data breach hit 500,000 people
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:08
comments (0)
South Korean Organizations Targeted by Cobalt Strike ‘Cat’ Delivered by a Rust Beacon
(hunt.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (0)
Android Banking Trojan – OctoV2, masquerading as Deepseek AI
(labs.k7computing.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
New Arcane infostealer infects YouTube, Discord users via game cheats
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:07
comments (1)
Ukrainian military targeted in new Signal spear-phishing attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:06
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:06
comments (0)
IBM urges quick patching of critical AIX bugs
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:05
comments (0)
Millions of Android TV boxes disconnected from hackers, but the risk remains
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Mar 12:04
comments (0)
Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:59
comments (0)
Password reuse is rampant: nearly half of observed user logins are compromised
(blog.cloudflare.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:58
comments (26)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:58
comments (26)
WhatsApp patched zero-click flaw exploited in Paragon spyware attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 17:57
comments (0)
US teachers' union says hackers stole sensitive personal data on over 500,000 members
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 19 Mar 16:21
comments (2)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 19 Mar 16:21
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Mar 13:33
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Mar 13:33
comments (2)
Microsoft isn't fixing 8-year-old zero day used for spying
(www.theregister.com)
in cybersecurity@sh.itjust.works from ptz@dubvee.org on 19 Mar 13:24
comments (22)
in cybersecurity@sh.itjust.works from ptz@dubvee.org on 19 Mar 13:24
comments (22)
BlackBasta Ransomware Ties to Russian Authorities Uncovered
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
Extortion Reboot: Ransomware Crew Threatens Leak to Snowden
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:50
comments (0)
New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:48
comments (0)
AMOS and Lumma stealers actively spread to Reddit users
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:45
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:45
comments (4)
How North Korea Launders Billions in Stolen Crypto
(www.coindesk.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:40
comments (0)
Shifting to Decentralized Data Storage: The Key to Better Data Security and Privacy - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:38
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:38
comments (3)
Blockchain gaming platform WEMIX hacked to steal $6.1 million
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (3)
Sperm donation giant California Cryobank warns of a data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:37
comments (0)
Teardrop Attack: Old-School Threat Still Targeting Systems
(cybernewslive.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
Domain Registrars Powering Russian Disinformation: A Deep Dive into Tactics and Trends - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:35
comments (0)
New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
AI Is Turbocharging Organized Crime, EU Police Agency Warns
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:34
comments (0)
Municipalities in four states (US) are struggling with cyberattacks limiting services
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Mar 11:33
comments (0)
New Arcane stealer spreading via YouTube and Discord.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 19 Mar 10:34
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 19 Mar 10:34
comments (0)
New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Mar 02:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Mar 02:58
comments (1)
Texas mulls establishing new Cyber Command
(www.route-fifty.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 19 Mar 01:56
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 19 Mar 01:56
comments (1)
Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 18:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 18:59
comments (0)
Massive RSA Encryption Flaw Exposes Millions Of IoT Devices To Attack
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:41
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:41
comments (6)
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....
(www.cobaltstrike.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:40
comments (0)
SocGholish Malware Facilitates RansomHub Distribution
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (0)
North Korean Hackers Deploy DocSwap Malware Disguised as Security App
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:38
comments (1)
Google's New YouTube Warning: No Ad Blockers or Lose Your Account?
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:37
comments (47)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:37
comments (47)
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
(www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:35
comments (0)
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
(www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:35
comments (0)
INDOHAXSEC Indonesian Hacking Collective | Arctic Wolf
(arcticwolf.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:34
comments (0)
OctoV2 Android Banking Trojan Masquerades as Deepseek AI in Phishing Attack
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
Microsoft: New RAT malware used for crypto theft, reconnaissance
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:33
comments (0)
Hackers target AI and crypto as software supply chain risks grow - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:32
comments (0)
Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (5)
Western Alliance Bank Notifies 21,889 Consumers of Recent Data Breach Stemming from Software Vulnerability | JD Supra
(www.jdsupra.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (0)
Hackers claim they’ve breached Orange and have “very detailed” information
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Mar 11:29
comments (1)
New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support
(hackread.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 05:34
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 05:34
comments (1)
Critical RCE flaw in Apache Tomcat actively exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Mar 04:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Mar 04:12
comments (0)
'Dead simple' RCE exploit in Apache Tomcat under attack
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 18 Mar 01:50
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 18 Mar 01:50
comments (0)
Infamous ransomware hackers reveal new tool to brute-force VPNs
(www.techradar.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 01:40
comments (3)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 01:40
comments (3)
New MassJacker clipper targets pirated software seekers
(web.archive.org)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 22:43
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 22:43
comments (1)
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption.
(tinyhack.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 22:05
comments (7)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 22:05
comments (7)
Warning over free online file converters that actually install malware.
(www.fbi.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 22:02
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 22:02
comments (1)
mac.c macOS Stealer
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 17 Mar 21:47
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 17 Mar 21:47
comments (0)
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 19:23
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 19:23
comments (0)
Widespread Coinbase phishing attack uncovered
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:32
comments (0)
Attackers use CSS to create evasive phishing messages
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (0)
Warning over free online file converters that actually install malware
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:31
comments (10)
CISA Flags Critical Ivanti Vulnerabilities Actively Exploited In The Wild
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:30
comments (0)
Critical RCE flaw in Apache Tomcat actively exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (0)
Microsoft: March Windows updates mistakenly uninstall Copilot
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 17:27
comments (4)
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft.
(www.microsoft.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 17 Mar 17:15
comments (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 17 Mar 17:15
comments (0)
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 17:15
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 17:15
comments (0)
Denmark warns of increased state-sponsored campaigns targeting the European telcos
(web.archive.org)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 15:43
comments (2)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 15:43
comments (2)
GitHub supply chain attack spills secrets from 23K projects
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Mar 13:32
comments (6)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 17 Mar 13:32
comments (6)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Mar 13:15
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Mar 13:15
comments (1)
Fraudsters Impersonate Clop Ransomware to Extort Businesses
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:43
comments (0)
Pay, fight, or stall? The dilemma of ransomware negotiations - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:39
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:39
comments (6)
CVE-2025–24813: Apache Tomcat Path Equivalence Vulnerability
(infosecwriteups.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (0)
New Akira ransomware decryptor cracks encryptions keys using GPUs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:38
comments (1)
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
(github.blog)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (1)
New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:36
comments (0)
Erickson Companies Notifies Victims of Recent Data Breach Leaking Their SSNs | JD Supra
(www.jdsupra.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Mar 11:35
comments (0)
popular github action compromised
(www.stepsecurity.io)
in cybersecurity@sh.itjust.works from leds@feddit.dk on 16 Mar 06:08
comments (0)
in cybersecurity@sh.itjust.works from leds@feddit.dk on 16 Mar 06:08
comments (0)
The ransomware clones of HellCat & Morpheus.
(thecyberwire.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 22:28
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 22:28
comments (0)
Questions about Argon2id and authentication handling overall
in cybersecurity@sh.itjust.works from thatonecoder@lemmy.ca on 15 Mar 20:45
comments (3)
in cybersecurity@sh.itjust.works from thatonecoder@lemmy.ca on 15 Mar 20:45
comments (3)
[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.
(www.bentasker.co.uk)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Mar 19:16
comments (1)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Mar 19:16
comments (1)
[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.
(www.bentasker.co.uk)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 18:47
comments (4)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 18:47
comments (4)
Thousands of healthcare records exposed online, including private patient information
(www.techradar.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 18:44
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 18:44
comments (0)
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:28
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:28
comments (1)
94% of Wi-Fi networks lack protection against deauthentication attacks - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:26
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:26
comments (8)
Jailbreaking is (mostly) simpler than you think | MSRC Blog
(msrc.microsoft.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:24
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 12:24
comments (1)
Ransomware Hits Record High: 126% Surge in Attacks in February 2025
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:58
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:58
comments (1)
Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:44
comments (0)
Car Exploit Allows You to Spy on Drivers in Real Time
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:42
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:42
comments (3)
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
New SuperBlack ransomware exploits Fortinet auth bypass flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
Cisco Alerts on Public Disclosure of CVE-2025-20115 - BGP Flaw Puts Networks at Risk
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:41
comments (0)
New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects | Microsoft Security Blog
(www.microsoft.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:39
comments (0)
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
(github.blog)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:39
comments (0)
CISA Releases Security Advisory on 13 Industrial Control System Threats
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:38
comments (0)
GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:36
comments (0)
OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 11:35
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 04:02
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 04:02
comments (0)
CISA: We didn't fire red teams, just unhired some of them
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 22:45
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 22:45
comments (2)
Ransomware Hits Record High: 126% Surge in Attacks in February 2025
(hackread.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 22:24
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 22:24
comments (0)
FreeType Zero-Day Being Exploited in the Wild
(www.securityweek.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 19:50
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 19:50
comments (0)
HealthTech Database Exposed 108GB Medical and Employment Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 18:27
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 18:27
comments (2)
Signal fails to address Ukraine cyber threat concerns against Russia - Cybersecurity Insiders
(www.cybersecurity-insiders.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 18:27
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 18:27
comments (1)
Juniper patches bug that let Chinese cyberspies backdoor routers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 18:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 18:25
comments (0)
Windows 10 KB5053606 update fixes broken SSH connections
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 17:18
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 17:18
comments (0)
Phishing campaign impersonates Booking. com, delivers a suite of credential-stealing malware.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 16:39
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 16:39
comments (0)
New OBSCURE#BAT Malware Targets Users with Fake Captchas
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 14:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 14:44
comments (0)
Cisco Issues High-Severity Security Alert for IOS XR Software (CVE-2025-20138)
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 14:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 14:43
comments (0)
New Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcams
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 14:07
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 14:07
comments (1)
DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware.
(www.tenable.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 14:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 14:05
comments (0)
China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 13:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 13:03
comments (0)
95% of data breaches involve human error, report reveals
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 13:02
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 13:02
comments (3)
Microsoft patches Windows Kernel zero-day exploited since 2023
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:59
comments (0)
Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:59
comments (0)
CISA: Medusa ransomware hit over 300 critical infrastructure orgs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:58
comments (0)
In-Depth Technical Analysis of the Bybit Hack
(www.nccgroup.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Mar 12:57
comments (0)
Head Mare and Twelve: Joint attacks on Russian entities.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 10:19
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 10:19
comments (0)
Lazarus Group deceives developers with 6 new malicious npm packages
(cyberscoop.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 00:42
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 00:42
comments (0)
Chinese snoops spotted on end-of-life Juniper routers
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 18:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 18:09
comments (0)
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:49
comments (0)
Android devices track you before you even sign in
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:48
comments (1)
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers.
(cloud.google.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:48
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:48
comments (0)
Defending against EDR bypass attacks - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:47
comments (0)
NIST selects HQC as backup algorithm for post-quantum encryption - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:46
comments (1)
Chinese Cyber Espionage Group UNC3886 Backdoored Juniper Routers
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:46
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:46
comments (1)
Mozilla warns users to update Firefox before certificate expires
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 17:45
comments (8)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 17:45
comments (8)
NVIDIA Addresses Security Vulnerabilities in NVIDIA Riva with Software Update
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:44
comments (0)
Mozilla warns users to update Firefox before certificate expires
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:43
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 17:43
comments (1)
Medusa Ransomware.
(www.cisa.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:34
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:34
comments (0)
Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:36
comments (0)
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:35
comments (0)
North Korean Lazarus hackers infect hundreds via npm packages
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:34
comments (0)
North Korean Lazarus hackers infect hundreds via npm packages
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:34
comments (0)
Critical PHP RCE vulnerability mass exploited in new attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:33
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 14:33
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 12:47
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 12:47
comments (1)
Microsoft March 2025 Patch Tuesday fixes 7 zero-days, 57 flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 12:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 12:29
comments (0)
Previously unidentified botnet infects unpatched TP-Link Archer home routers
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 12:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 12:28
comments (0)
UK Government Report Calls for Stronger Open Source Supply Chain Security Practices
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 12:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 12:28
comments (0)
North Korean Lazarus hackers infect hundreds via npm packages
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:58
comments (1)
Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:44
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:44
comments (0)
On The Insecurity of Telecom Stacks in the Wake of Salt Typhoon - Dhole Moments
(soatok.blog)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 04:55
comments (0)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 04:55
comments (0)
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
(techcrunch.com)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 21:24
comments (8)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 21:24
comments (8)
'Uber for nurses' exposes 86k+ medical records, PII.
(www.theregister.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 17:59
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 17:59
comments (1)
Google researchers uncover critical security flaw in all AMD Zen processors
(www.techspot.com)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 04:05
comments (3)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 04:05
comments (3)
The ESP32 Bluetooth Backdoor That Wasn’t
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 22:53
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 22:53
comments (1)
SideWinder targets the maritime and nuclear sectors with an updated toolset.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 16:30
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 16:30
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 16:17
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 16:17
comments (0)
SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 13:01
comments (0)
Undocumented hidden feature found in Espressif ESP32 microchip
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 13:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 13:00
comments (0)
Undocumented hidden feature found in Espressif ESP32 microchip
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 13:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 13:00
comments (0)
Cobalt Strike Exploitation by Hackers Drops, Report Reveals
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 12:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 12:57
comments (0)
New Chirp tool uses audio tones to transfer data between devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 12:56
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 12:56
comments (4)
US cities warn of wave of unpaid parking phishing texts
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 12:00
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 12:00
comments (4)
Apache Traffic Server Vulnerabilities Let Attackers Perform Malformed Requests
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 11:57
comments (0)
Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 11:56
comments (0)
US seizes $23 million in crypto linked to LastPass breaches
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 11:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Mar 11:54
comments (0)
Snopes Twitter got hacked. Twitter screws up the response
(infosec.exchange)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:57
comments (10)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:57
comments (10)
How to Set Up Your Online Identity on Keyoxide: A Simple Guide
(blog.epic-worlds.com)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:29
comments (10)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:29
comments (10)
Undocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.
(www.tarlogic.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 21:06
comments (9)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 21:06
comments (9)
YouTubers extorted via copyright strikes to spread malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 18:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 18:37
comments (0)
Undocumented backdoor found in Bluetooth chip used by a billion devices
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 17:25
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 17:25
comments (1)
Undocumented backdoor found in Bluetooth chip used by a billion devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 08 Mar 17:09
comments (33)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 08 Mar 17:09
comments (33)
Hacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court order
(techcrunch.com)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 21:54
comments (0)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 21:54
comments (0)