Vulnerability Report - August 2025
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Sep 14:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Sep 14:06
comments (0)
Modern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attacks
(cyberinsider.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 22:00
comments (13)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 22:00
comments (13)
France says Apple notified victims of new spyware attacks
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 21:59
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 21:59
comments (0)
European crypto platform SwissBorg to reimburse users after $41 million theft
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:38
comments (0)
DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:30
comments (0)
Jaguar Land Rover confirms data theft after recent cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:18
comments (0)
Malicious npm Code Reached 10% of Cloud Environments
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:05
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:05
comments (1)
China pilots village surveillance in Solomon Islands in the Pacific, where Chinese police are collecting fingerprints, palm prints to "curb social unrest"
(www.reuters.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Sep 16:31
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Sep 16:31
comments (0)
China pilots village surveillance in Solomon Islands in the Pacific, where Chinese police are collecting fingerprints, palm prints to "curb social unrest"
(www.reuters.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 11 Sep 16:30
comments (2)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 11 Sep 16:30
comments (2)
Nokia CEO calls on EU to remove “high-risk vendors” - specifically China's Huawei and ZTE - from European networks
(coincentral.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (0)
Nokia CEO calls on EU to remove “high-risk vendors” - specifically China's Huawei and ZTE - from European networks
(coincentral.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (12)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (12)
US Senator Wyden pushes FTC to investigate Microsoft for 'gross cybersecurity negligence'
(www.reuters.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 10 Sep 21:48
comments (1)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 10 Sep 21:48
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Sep 16:13
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Sep 16:13
comments (1)
A look at a P2P camera (LookCam app)
(palant.info)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Sep 14:22
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Sep 14:22
comments (0)
Apple: iPhone 17 lineup and iPhone Air come with Memory Integrity Enforcement, which provides always-on memory safety protection
(security.apple.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Sep 13:52
comments (4)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Sep 13:52
comments (4)
Surge in networks scans targeting Cisco ASA devices raise concerns
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:48
comments (0)
45 New Domains Linked to Salt Typhoon, UNC4841
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:40
comments (0)
Georgia Hospital Notifying 163,000 of 2024 Ransomware Hack
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:22
comments (0)
npm debug and chalk packages compromised
(www.aikido.dev)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Sep 17:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Sep 17:47
comments (0)
Plex Media Server: Important Notice of Security Incident
(forums.plex.tv)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 12:37
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 12:37
comments (0)
Graphite, the Israeli spyware acquired by ICE
(english.elpais.com)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 08:03
comments (1)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 08:03
comments (1)
Graphite, the Israeli spyware acquired by ICE
(english.elpais.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 08:03
comments (3)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 08:03
comments (3)
Ex-WhatsApp cybersecurity head says Meta endangered billions of users in new suit
(www.theguardian.com)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
Ex-WhatsApp cybersecurity head says Meta endangered billions of users in new suit
(www.theguardian.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
Largest NPM Compromise in History(Packages With Over 2.6 Billion Total Weekly Downloads) - Supply Chain Attack
(www.aikido.dev)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:56
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:56
comments (0)
LookCam App Users Exposed to Critical Security Risks
(palant.info)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:55
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:55
comments (0)
18 Popular Code Packages Hacked, Rigged to Steal Crypto – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 00:44
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 00:44
comments (0)
Czech cyber agency flags Chinese espionage risks to critical infrastructure
(securityaffairs.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
Czech cyber agency flags Chinese espionage risks to critical infrastructure
(securityaffairs.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
Double trouble with CastleRAT malware, now in C and Python
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Sep 17:26
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Sep 17:26
comments (0)
We Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillance
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 Sep 14:24
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 Sep 14:24
comments (1)
ImaginaryCTF 2025 | September 5-7, 12 PM PDT | a cybersecurity CTF competition with a variety of challenges for all skill levels
(2025.imaginaryctf.org)
in cybersecurity@infosec.pub from otter@lemmy.ca on 05 Sep 20:28
comments (0)
in cybersecurity@infosec.pub from otter@lemmy.ca on 05 Sep 20:28
comments (0)
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 05 Sep 20:10
comments (2)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 05 Sep 20:10
comments (2)
Sextortion with a twist: Spyware takes webcam pics of users watching porn
(arstechnica.com)
in cybersecurity@sh.itjust.works from return2ozma@lemmy.world on 05 Sep 18:47
comments (9)
in cybersecurity@sh.itjust.works from return2ozma@lemmy.world on 05 Sep 18:47
comments (9)
Chess.com confirms data breach
(www.neowin.net)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 18:35
comments (9)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 18:35
comments (9)
Zero-day vulnerability discovered in TP-Link routers
(www.techzine.eu)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 15:03
comments (7)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 15:03
comments (7)
China-aligned crew poisons Windows servers to manipulate Google results
(www.welivesecurity.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Sep 10:55
comments (2)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Sep 10:55
comments (2)
Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 05 Sep 05:42
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 05 Sep 05:42
comments (0)
The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest.
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Sep 23:54
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Sep 23:54
comments (3)
AI hacking. Downloading images can allow your computer to be hijacked
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 04 Sep 20:50
comments (3)
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 04 Sep 20:50
comments (3)
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 17:35
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 17:35
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 14:10
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 14:10
comments (1)
My Pixel 10 warned me 8 times in 30-minutes that there was a rogue connection made. Deeply concerning
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 02 Sep 00:26
comments (64)
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 02 Sep 00:26
comments (64)
[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method
(www.usenix.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 19:47
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 19:47
comments (0)
DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally
(www.netscout.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 16:43
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 16:43
comments (0)
Pizza Intelligence - How Pentagon pizza orders correlate with big news
(pizzint.watch)
in cybersecurity@sh.itjust.works from RagnarokOnline@programming.dev on 30 Aug 15:13
comments (7)
in cybersecurity@sh.itjust.works from RagnarokOnline@programming.dev on 30 Aug 15:13
comments (7)
DHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access Federal Emergency Management Agency (FEMA) networks
(www.dhs.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 30 Aug 12:34
comments (10)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 30 Aug 12:34
comments (10)
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 20:05
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 20:05
comments (0)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 19:45
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 19:45
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:46
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:46
comments (0)
Cybersecurity News Review - Week 35 (2025)
(cybernewsweekly.substack.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 18:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 18:47
comments (0)
New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 14:34
comments (2)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 14:34
comments (2)
Two New feeds from CERT-FR integrated in Vulnerability-Lookup
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 13:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 13:47
comments (0)
I Hacked BellaBot and Every Robot from China's Biggest Robotics Company (Pudu Only Fixed It When I Told Their Clients)
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 29 Aug 13:29
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 29 Aug 13:29
comments (0)
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:07
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:07
comments (1)
Netherlands Confirms China’s Salt Typhoon Hacking Group Targeted Small Dutch Telcos
(www.infosecurity-magazine.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
Netherlands Confirms China’s Salt Typhoon Hacking Group Targeted Small Dutch Telcos
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
Google is getting ready to 'hack back' as US considers shifting from cyber defense to offense — new 'Scam Farms' bill opens up new retaliatory hacking actions
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:02
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:02
comments (0)
Catch-22: Uncovering Compromised Hosts using SSH Public Keys | USENIX
(www.usenix.org)
in cybersecurity@infosec.pub from jstangroome@infosec.pub on 29 Aug 00:30
comments (0)
in cybersecurity@infosec.pub from jstangroome@infosec.pub on 29 Aug 00:30
comments (0)
The FBI and agencies in the UK, Canada, and others warn that a Chinese hacking campaign targeting US telecoms has expanded to more countries and US companies
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 28 Aug 08:52
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 28 Aug 08:52
comments (0)
UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks
(www.ncsc.gov.uk)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks
(www.ncsc.gov.uk)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
Russia-based Yandex employee oversees open-source software approved for Department of Defense use
(huntedlabs.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 18:16
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 18:16
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Aug 14:56
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Aug 14:56
comments (2)
Malicious versions of Nx and some supporting plugins were published
(github.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:20
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:20
comments (0)
Anthropic: Claude was weaponized for sophisticated cybercrimes, including a “vibe-hacking” data extortion scheme
(www.anthropic.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:03
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:03
comments (0)
The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says
(www.nytimes.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 27 Aug 08:15
comments (1)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 27 Aug 08:15
comments (1)
The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says
(www.nytimes.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 27 Aug 08:14
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 27 Aug 08:14
comments (0)
ESET Research: The first AI-powered(LLM) ransomware has been discovered- PromptLock.
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 21:12
comments (7)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 21:12
comments (7)
Malware-ridden apps made it into Google's Play Store, scored 19 million downloads
(www.theregister.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 26 Aug 13:27
comments (5)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 26 Aug 13:27
comments (5)
Cyberattack on state systems bring Nevada’s official websites & phone lines down; officials rely on social media to issue updates
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:23
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:23
comments (0)
Chinese Hackers Hijack Web Traffic to Spy on Foreign Diplomats
(cloud.google.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:22
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:22
comments (0)
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 26 Aug 10:48
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 26 Aug 10:48
comments (0)
Vulnerability-Lookup 2.15.0 released
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 14:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 14:07
comments (0)
BCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourg
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 14:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 14:06
comments (0)
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 25 Aug 13:42
comments (0)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 25 Aug 13:42
comments (0)
ghrc.io Appears to be Malicious
(bmitch.net)
in cybersecurity@sh.itjust.works from sith@lemmy.zip on 25 Aug 03:31
comments (0)
in cybersecurity@sh.itjust.works from sith@lemmy.zip on 25 Aug 03:31
comments (0)
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
(thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 24 Aug 21:53
comments (4)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 24 Aug 21:53
comments (4)
Can you recommend a book that teaches you about cybersecurity?
in cybersecurity@sh.itjust.works from kennedy@lemmy.dbzer0.com on 24 Aug 14:50
comments (12)
in cybersecurity@sh.itjust.works from kennedy@lemmy.dbzer0.com on 24 Aug 14:50
comments (12)
I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doors
(bobdahacker.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Aug 20:35
comments (12)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Aug 20:35
comments (12)
I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doors
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Aug 20:35
comments (29)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Aug 20:35
comments (29)
Data I/O ransomware attack ‘temporarily impacted’ operations
(www.theregister.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 23 Aug 05:15
comments (0)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 23 Aug 05:15
comments (0)
GrapheneOS: Another contributor attacked & banned by Daniel Micay
(tech.michaelaltfield.net)
in cybersecurity@sh.itjust.works from maltfield@monero.town on 19 Aug 16:37
comments (0)
in cybersecurity@sh.itjust.works from maltfield@monero.town on 19 Aug 16:37
comments (0)
Hackers access data of 850,000 Orange Belgium customers
(www.euractiv.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
Hackers access data of 850,000 Orange Belgium customers
(www.euractiv.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
Colt Confirms Customer Data Stolen in Ransomware Attack
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:11
comments (0)
Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To China
(citizenlab.ca)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (0)
How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) | bobdahacker
(bobdahacker.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 20 Aug 15:20
comments (6)
in cybersecurity@infosec.pub from cm0002@piefed.world on 20 Aug 15:20
comments (6)
[Meta] Can you allow the English language posts?
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Aug 14:49
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Aug 14:49
comments (1)
Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure
(www.ic3.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 14:43
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 14:43
comments (0)
UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity risks
(www.artificialintelligence-news.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:26
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:26
comments (0)
UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity risks
(www.artificialintelligence-news.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:25
comments (2)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:25
comments (2)
Zero-Day Vulnerability allow attackers to steal users data Found in Password Managers( 1Password, Bitwarden, LastPass, Enpass, iCloud Passwords, and LogMeOnce remain unpatched— still vulnerable)
(marektoth.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 10:01
comments (8)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 10:01
comments (8)
Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To China
(citizenlab.ca)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (1)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (1)
How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe)
(bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 18:52
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 18:52
comments (0)
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
(research.kudelskisecurity.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 16:54
comments (2)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 16:54
comments (2)
Intel Outside: Hacking every Intel employee and various internal websites
(eaton-works.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 13:56
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 13:56
comments (1)
Intel Outside: Hacking every Intel employee and various internal websites
(eaton-works.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 07:31
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 07:31
comments (0)
Cyber attack exposes details of more than 200,000 iinet customers
(www.abc.net.au)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 19 Aug 07:00
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 19 Aug 07:00
comments (0)
Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Tools
(cybersrcc.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (0)
Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Tools
(cybersrcc.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (1)
Google's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdot
(yro.slashdot.org)
in cybersecurity@infosec.pub from cm0002@piefed.world on 18 Aug 14:12
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 18 Aug 14:12
comments (1)
Researcher to release exploit for full auth bypass on FortiWeb
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 17 Aug 23:48
comments (0)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 17 Aug 23:48
comments (0)
Citizen Lab director warns Black Hat security conference about authoritarian descent
(techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 17 Aug 10:33
comments (0)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 17 Aug 10:33
comments (0)
Citizen Lab director warns Black Hat security conference about authoritarian descent
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 17 Aug 10:31
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 17 Aug 10:31
comments (0)
LLM chatbots trivial to weaponize for data theft, say boffins
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 17:34
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 17:34
comments (0)
SoupDealer Malware Bypasses Every Sandbox, AV's and EDR/XDR in Real-World Incidents
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 00:26
comments (8)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 00:26
comments (8)
MadeYouReset: Turning HTTP/2 Server Against Itself | Imperva
(www.imperva.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 15 Aug 13:55
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 15 Aug 13:55
comments (0)
For $40, you can buy stolen police and government email accounts
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 14 Aug 21:13
comments (5)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 14 Aug 21:13
comments (5)
Malvertising campaign leads to PS1Bot, a multi-stage malware framework
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 14:02
comments (0)
Data leak could cut electricity to Mexico | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:34
comments (0)
Pennsylvania attorney general's email, site down after cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:25
comments (0)
Major HTTP flaw puts 24 million websites at risk | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:18
comments (9)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:18
comments (9)
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:09
comments (0)
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:00
comments (0)
Microsoft fixes "BadSuccessor" Kerberos vulnerability (CVE-2025-53779) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 11:57
comments (0)
Hackers Raid Dutch Lab, Stealing Data on 500,000 Patients - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:34
comments (0)
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:25
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:25
comments (2)
Home Office Phishing Scam Targets UK Immigration Sponsors - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:17
comments (0)
Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:10
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:10
comments (1)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition
(vreme.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 13 Aug 2025 13:02
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 13 Aug 2025 13:02
comments (0)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition
(vreme.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 13 Aug 2025 13:02
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 13 Aug 2025 13:02
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks
(www.aspistrategist.org.au)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 04:51
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 04:51
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks
(www.aspistrategist.org.au)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 04:51
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 04:51
comments (0)
Russia Is Suspected to Be Behind Breach of Federal Court Filing System
(archive.ph)
in cybersecurity@sh.itjust.works from sundray@lemmus.org on 12 Aug 2025 23:10
comments (0)
in cybersecurity@sh.itjust.works from sundray@lemmus.org on 12 Aug 2025 23:10
comments (0)
Docker Hub still hosts dozens of Linux images with the XZ backdoor
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Aug 2025 19:14
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Aug 2025 19:14
comments (1)
Saint Paul cyberattack linked to Interlock ransomware gang
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 17:02
comments (0)
Scattered Spider and ShinyHunters' Next Move: Leaking Data
(www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 16:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 16:58
comments (0)
ShinyHunters Unveils That BreachForums Taken by Law Enforcement Agencies, Now It Is a Honeypot
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 12 Aug 2025 16:56
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 12 Aug 2025 16:56
comments (1)
New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises | Trend Micro (US)
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 16:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 16:48
comments (0)
Adult sites trick users into Liking Facebook posts using a clickjack Trojan
(www.malwarebytes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Aug 2025 13:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Aug 2025 13:58
comments (0)
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:41
comments (0)
Flaws in Major Automaker's Dealership Systems Allowed Car Hacking, Personal Data Theft - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:32
comments (0)
Over 29,000 Exchange servers unpatched against high-severity flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:25
comments (0)
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:16
comments (0)
Hackers steal Google Ads business contact data | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:09
comments (0)
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 12 Aug 2025 04:55
comments (3)
in cybersecurity@infosec.pub from cm0002@piefed.world on 12 Aug 2025 04:55
comments (3)
MuddyWater’s DarkBit ransomware cracked for free data recovery
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 18:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 18:26
comments (0)
Connex Credit Union data breach impacts 172,000 members
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 18:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 18:14
comments (0)
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 14:44
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 14:44
comments (6)
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscaler, and NetSkope
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 14:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 14:30
comments (0)
Data Dump From APT Actor Yields Clues to Attacker Capabilities
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:34
comments (0)
Ransomware Attacks Fall by Almost Half in Q2
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:26
comments (0)
Google Calendar invites let researchers hijack Gemini to leak user data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:17
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:17
comments (2)
U.S. Judiciary confirms breach of court electronic records service
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:09
comments (0)
Cancer care provider breach exposes 113K+ patients | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:01
comments (0)
GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:56
comments (0)
15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:48
comments (1)
Boeing, US Navy supplier Jamco Aerospace claimed in ransomware attack | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:42
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:42
comments (1)
WinRAR zero-day exploited to plant malware on archive extraction
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:33
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:33
comments (2)
Australian Regulator Sues Optus Over 2022 Data Breach
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:12
comments (0)
The inside story of the Telemessage saga, and how you can view the data
(www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 10 Aug 2025 22:16
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 10 Aug 2025 22:16
comments (0)
BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 09 Aug 2025 23:08
comments (4)
in cybersecurity@infosec.pub from cm0002@piefed.world on 09 Aug 2025 23:08
comments (4)
Flipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 02:32
comments (27)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 02:32
comments (27)
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 02:21
comments (20)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 02:21
comments (20)
Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds
(www.wired.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 09 Aug 2025 00:08
comments (27)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 09 Aug 2025 00:08
comments (27)
Is it fine if a website says "email already in use" before you hit submit?
in cybersecurity@sh.itjust.works from Jankatarch@lemmy.world on 08 Aug 2025 22:14
comments (42)
in cybersecurity@sh.itjust.works from Jankatarch@lemmy.world on 08 Aug 2025 22:14
comments (42)
DEFCON Twitch Streams are live
(dctv.defcon.org)
in cybersecurity@infosec.pub from scytale@piefed.zip on 08 Aug 2025 17:42
comments (0)
in cybersecurity@infosec.pub from scytale@piefed.zip on 08 Aug 2025 17:42
comments (0)
Security Researchers found a way to trick Windows Hello authentication, but there is a simple fix - gHacks Tech News
(www.ghacks.net)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 08 Aug 2025 15:57
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 08 Aug 2025 15:57
comments (1)
Oops Safari, I think You Spilled Something!
(blog.exodusintel.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Aug 2025 09:53
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Aug 2025 09:53
comments (0)
Cyber Resilience Corps - Protecting America's Communities Together
(www.cybervolunteers.us)
in cybersecurity@infosec.pub from ryokimball@infosec.pub on 08 Aug 2025 00:42
comments (0)
in cybersecurity@infosec.pub from ryokimball@infosec.pub on 08 Aug 2025 00:42
comments (0)
HTTP/1.1 Must Die: What This Means for AppSec Leadership
(portswigger.net)
in cybersecurity@infosec.pub from cron@feddit.org on 07 Aug 2025 21:31
comments (1)
in cybersecurity@infosec.pub from cron@feddit.org on 07 Aug 2025 21:31
comments (1)
GenAI Used to Impersonate Brazil’s Govt Websites | ThreatLabz
(www.zscaler.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:24
comments (0)
Shared secret: EDR killer in the kill chain – Sophos News
(news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:17
comments (0)
Makop Ransomware Identified in Attacks in South Korea - ASEC
(asec.ahnlab.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:10
comments (0)
Google suffers data breach in ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:01
comments (0)
KLM Confirms Customer Data Breach Linked to Third-Party System
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 13:57
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 13:57
comments (1)
Ukraine claims to have hacked secrets from Russia's newest nuclear submarine
(www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 13:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 13:50
comments (0)
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault
(cyata.ai)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Aug 2025 09:01
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Aug 2025 09:01
comments (0)
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Aug 2025 03:18
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Aug 2025 03:18
comments (0)
Gov+
(www.bbb.org)
in cybersecurity@sh.itjust.works from griff@lemmings.world on 06 Aug 2025 18:34
comments (4)
in cybersecurity@sh.itjust.works from griff@lemmings.world on 06 Aug 2025 18:34
comments (4)
Google suffers data breach in ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 17:45
comments (0)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 17:45
comments (0)
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 17:44
comments (0)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 17:44
comments (0)
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 16:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 16:23
comments (0)
Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 14:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 14:49
comments (0)
ReVault! When your SoC turns against you…
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Aug 2025 14:16
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Aug 2025 14:16
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Aug 2025 13:58
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Aug 2025 13:58
comments (0)
Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto | SentinelOne
(www.sentinelone.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 13:08
comments (0)
Rapid Breach: Social Engineering to Remote Access in 300 Seconds | NCC Group
(www.nccgroup.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 13:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 13:00
comments (0)
Cybersecurity Services, Solutions & Products. Global Provider | Group-IB
(www.group-ib.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:56
comments (0)
Pandora confirms data breach amid ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:49
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:49
comments (1)
PBS confirms data breach after employee info leaked on Discord servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:40
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:40
comments (2)
Cisco User Data Stolen in Vishing Attack
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:33
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:33
comments (4)
Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistance
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Aug 2025 08:59
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Aug 2025 08:59
comments (2)
ClickTok: The SparkKitty Drop on TikTok Shops
(www.ctm360.com)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 17:13
comments (0)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 17:13
comments (0)
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape
(socket.dev)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 13:01
comments (0)
Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
(blog.cloudflare.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:58
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:58
comments (6)
LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:50
comments (6)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:50
comments (6)
Ransomware groups shift to quadruple extortion to maximize pressure - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:42
comments (0)
Nvidia Patches Critical RCE Vulnerability Chain
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:35
comments (0)
Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integrity
(cispa.de)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 09:14
comments (0)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 09:14
comments (0)
Ransomware gangs join attacks targeting Microsoft SharePoint servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 17:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 17:38
comments (0)
From Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 17:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 17:29
comments (1)
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 16:55
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 16:55
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Aug 2025 14:21
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Aug 2025 14:21
comments (0)
Attackers exploit link-wrapping services to steal Microsoft 365 logins
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:25
comments (0)
Pi-hole discloses data breach triggered by WordPress plugin flaw
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:16
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:16
comments (1)
Average global data breach cost now $4.44 million - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:09
comments (0)