home groups about login help
Nation-state hackers deliver malware from “bulletproof” blockchains - Ars Technica (arstechnica.com)
in cybersecurity@sh.itjust.works from otters_raft@lemmy.ca on 17 Oct 23:00
comments (7)
Whatever happened to Secure Quick Reliable Login (SQRL)?
in cybersecurity@infosec.pub from onlinepersona@programming.dev on 17 Oct 19:40
comments (1)
MS Digital Defense Report (cdn-dynmedia-1.microsoft.com)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 17 Oct 14:13
comments (0)
Have I Been Pwned: Prosper data breach impacts 17.6 million accounts (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Oct 13:37
comments (0)
Tenable Discovers Critical Vulnerabilities in SimpleHelp Tool: CVE-2025-36727 and CVE-2025-36728 (securityboulevard.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Oct 13:00
comments (0)
Gladinet fixes actively exploited zero-day in file-sharing software (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Oct 12:52
comments (0)
New deadline: Claim up to $7,500 from AT&T's $177M data breach payouts - here's how | ZDNET (www.zdnet.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Oct 12:31
comments (0)
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in "Zero Disco' Attacks (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 19:14
comments (1)
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog (cloud.google.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 19:03
comments (1)
Whisper 2FA Behind One Million Phishing Attempts Since July - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 18:20
comments (1)
Ransomware gang says it hacked Kearney Public Schools, but district says it didn't get ransom demand - Comparitech (www.comparitech.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 18:05
comments (0)
Fake LastPass, Bitwarden breach alerts lead to PC hijacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 15:07
comments (2)
Video call app Huddle01 leaks data​ | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 14:36
comments (0)
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 14:22
comments (2)
Flaw in Slider Revolution Plugin Exposed 4m WordPress Sites - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 14:04
comments (0)
Human Risk Report Reveals Overconfidence in Phishing Defenses (www.techrepublic.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 13:51
comments (0)
Harvard University Breached in Oracle Zero-Day Attack (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 13:36
comments (1)
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 13:18
comments (0)
Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 13:02
comments (5)
Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Oct 12:49
comments (0)
338 Malicious npm Packages Linked to North Korean Hackers | eSecurity Planet (www.esecurityplanet.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 17:18
comments (0)
Fortra cops to exploitation of GoAnywhere file-transfer service defect (cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 16:59
comments (0)
F5 says hackers stole undisclosed BIG-IP flaws, source code (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 16:15
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 15 Oct 15:43
comments (0)
Adobe Security Update Fixes Critical CVE-2025-49553 Bug (thecyberexpress.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 13:53
comments (0)
Study reveals satellites comms spilling unencrypted data • The Register (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 13:36
comments (1)
Oracle issues second emergency patch for E-Business Suite in two weeks | CSO Online (www.csoonline.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 13:20
comments (1)
UK: 130% Spike in “Nationally Significant” Cyber Incidents - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 13:06
comments (0)
Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 12:49
comments (0)
Capita Fined £14m After 2023 Breach that Hit 6.6 Million People - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 12:34
comments (0)
Hackers claim attacks on Texas electric co-ops | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 12:17
comments (0)
RealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbacks (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 15 Oct 03:40
comments (1)
Sonicwall confirms exfil of all (encrypted/encoded) connected firewall backup configurations (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from Appoxo@lemmy.dbzer0.com on 14 Oct 20:57
comments (3)
Chinese Hackers Use Trusted ArcGIS App For Year-Long Persistence - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 19:52
comments (0)
This new Android exploit can steal everything on your screen - even 2FA codes | ZDNET (www.zdnet.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 19:35
comments (1)
Hacker Group TA585 Emerges With Advanced Attack Infrastructure - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 19:22
comments (0)
Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 19:08
comments (0)
New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 18:46
comments (2)
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data (www.wired.com)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 14 Oct 17:21
comments (0)
SimonMed says 1.2 million patients impacted in January data breach (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 13:18
comments (0)
RealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbacks (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 13:02
comments (1)
2 Radiology Practices Disclose Hacks Affecting 1.5M Patients (www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 12:45
comments (0)
Invoicely Database Leak Exposes 180,000 Sensitive Records (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 12:37
comments (0)
Microsoft restrains exploited legacy IE mode in Edge browser - iTnews (www.itnews.com.au)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 12:23
comments (0)
OpenAI’s Guardrails Can Be Bypassed by Simple Prompt Injection Attack (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 12:02
comments (5)
SonicWall VPN accounts breached using stolen creds in widespread attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 11:45
comments (0)
Salesforce Extortion Group Leaks Data After FBI Disruption (www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Oct 11:33
comments (1)
New Stealit Malware Campaign Spreads via VPN and Game Installer Apps - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 19:35
comments (0)
Harvard investigating breach linked to Oracle zero-day exploit (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 19:19
comments (0)
Massive multi-country botnet targets RDP services in the US (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from tonytins@pawb.social on 13 Oct 19:07
comments (1)
Hackers Target ScreenConnect Features For Network Intrusions - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 19:00
comments (0)
Threat Actors Weaponize Discord Webhooks for Command and Control with npm, PyPI, and Ruby Packages (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 18:42
comments (0)
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 14:18
comments (0)
Cybercrime ring GXC Team dismantled in Spain, 25-year-old leader detained (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 14:02
comments (0)
Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 13:47
comments (0)
Fake 'Inflation Refund' texts target New Yorkers in new scam (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 13:37
comments (0)
Hackers exploiting zero-day in Gladinet file sharing software (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 13:23
comments (2)
Juniper Networks Patches Critical Junos Space Vulnerabilities - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 13:03
comments (0)
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 12:47
comments (0)
Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 12:37
comments (0)
Hackers leak Qantas data containing 5 million customer records after ransom deadline passes | Qantas | The Guardian (www.theguardian.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 12:19
comments (0)
Apple offers $2 million for zero-click exploit chains - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Oct 12:05
comments (0)
ASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Users (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 12 Oct 15:53
comments (2)
FBI takes down BreachForums portal used for Salesforce extortion (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from KarnaSubarna@lemmy.ml on 11 Oct 08:39
comments (1)
RondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home device (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 11 Oct 04:10
comments (6)
Microsoft: Hackers target universities in “payroll pirate” attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 18:15
comments (0)
FBI takes down BreachForums portal used for Salesforce extortion (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 18:07
comments (0)
Ransomware gang says it hacked merchandise distributor SRP not once, but twice - Comparitech (www.comparitech.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 17:48
comments (0)
SaaS Breaches Start with Tokens - What Security Teams Must Watch (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 14:17
comments (1)
Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0 (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 14:05
comments (0)
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 13:52
comments (0)
Hackers now use Velociraptor DFIR tool in ransomware attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 13:30
comments (0)
Attackers compromised ALL SonicWall firewall configuration backup files - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 13:21
comments (3)
Researchers Warn of Security Gaps in AI Browsers - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 12:48
comments (0)
GitHub Copilot Chat Flaw Let Private Code Leak Via Images (www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 12:36
comments (0)
Google says 'likely over 100' affected by Oracle-linked hacking campaign (www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 12:20
comments (2)
RondoDox botnet targets 56 n-day flaws in worldwide attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 12:07
comments (0)
Azure outage blocks access to Microsoft 365 services, admin portals (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 22:00
comments (4)
ID photos of 70,000 users may have been leaked, Discord says (www.bbc.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 09 Oct 14:35
comments (41)
The State of Ransomware in Healthcare 2025 – Sophos News (news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:31
comments (0)
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:23
comments (0)
ShinyHunters Wage Broad Corporate Extortion Spree – Krebs on Security (krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 14:07
comments (0)
Microsoft warns about hackers abusing Teams | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:51
comments (1)
OpenAI bans some Chinese, Russian accounts using AI for evil • The Register (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:36
comments (1)
Crimson Collective hackers target AWS cloud instances for data theft (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:19
comments (0)
Hackers claim Discord breach exposed data of 5.5 million users (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 13:02
comments (2)
Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:51
comments (0)
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:38
comments (0)
Hackers exploit auth bypass in Service Finder WordPress theme (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:17
comments (0)
Telco biz ICUK restores services after two-day DDoS pelting • The Register (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 12:03
comments (0)
Major US law firm says hackers broke into attorneys’ emails accounts | The Record from Recorded Future News (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Oct 11:48
comments (0)
Met Police Arrest Two Teens in Connection with Kido Attack - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:30
comments (2)
Military radio maker BK Technologies cops to cyber break-in • The Register (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:19
comments (0)
DraftKings warns of account breaches in credential stuffing attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 19:06
comments (0)
North Korean hackers stole over $2 billion in cryptocurrency this year - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 14:18
comments (4)
VTEX data leak exposes data of 6M shoppers | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 14:04
comments (0)
The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:48
comments (3)
Phishers turn 1Password’s Watchtower into a blind spot | CSO Online (www.csoonline.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:34
comments (0)
Salesforce refuses to pay ransom over widespread data theft attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:17
comments (0)
Shuyal Stealer Malware Exploits 19 Browsers to Steal Logins (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 13:08
comments (4)
Qilin Claims Ransomware Attack on Mecklenburg Schools - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:33
comments (0)
Red Hat data breach escalates as ShinyHunters joins extortion (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:18
comments (0)
Electronics giant Avnet confirms breach, says stolen data unreadable (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 18:02
comments (0)
Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 17:46
comments (0)
U.S. CISA adds Smartbedded Meteobridge, Samsung, Juniper ScreenOS, Jenkins, and GNU Bash flaws to its Known Exploited Vulnerabilities catalog (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 14:46
comments (0)
XWorm malware resurfaces with ransomware module, over 35 plugins (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:46
comments (0)
Rhadamanthys 0.9.x - walk through the updates - Check Point Research (research.checkpoint.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:32
comments (0)
Oracle patches EBS zero-day exploited in Clop data theft attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 13:01
comments (0)
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:47
comments (0)
New Study Warns Several Free iOS and Android VPN Apps Leak Data (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:31
comments (11)
Massive surge in scans targeting Palo Alto Networks login portals (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:16
comments (0)
Hackers exploited Zimbra flaw as zero-day using iCalendar files (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 12:00
comments (0)
Stealing JWT Tokens via OAuth redirect_uri Manipulation: A Critical Vulnerability | by Shah kaif | Oct, 2025 | InfoSec Write-ups (infosecwriteups.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:45
comments (0)
Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 11:32
comments (0)
Chinese hackers exploiting VMware zero-day since October 2024 (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
EOL Router Question/ OpenWRT
in cybersecurity@sh.itjust.works from sic_semper_tyrannis@lemmy.today on 07 Oct 13:11
comments (9)
Medusa ransomware used during exploitation of GoAnywhere file transfer bug, Microsoft says | The Record from Recorded Future News (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:46
comments (0)
Hackers exploiting critical Oracle EBS flaw | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:30
comments (0)
Critical 9.9 Redis vulnerability enables remote code execution | SC Media (www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:17
comments (1)
Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 12:02
comments (0)
Rainwalk Pet Insurance Exposes 158 GB of US Customer and Pet Data (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:46
comments (3)
Abracadabra.money hacked again​ | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 11:30
comments (0)
Suspected Chinese cyber spies targeted Serbian aviation agency (therecord.media)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:15
comments (0)
Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Oct 15:02
comments (0)
Suspected Chinese cyber spies targeted Serbian aviation agency (therecord.media)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 07 Oct 07:40
comments (0)
Chinese hackers exploiting VMware zero-day since October 2024 (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 Oct 05:40
comments (0)
ShinyHunters launches Salesforce data leak site to extort 39 victims (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:55
comments (0)
CommetJacking attack tricks Comet browser into stealing emails (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 04 Oct 12:53
comments (1)
3rd Party Providing Discord Customer Service Breached (www.theverge.com)
in cybersecurity@sh.itjust.works from HexesofVexes@lemmy.world on 04 Oct 09:24
comments (1)
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.social on 04 Oct 03:07
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Oct 16:55
comments (3)
Le Tour du Hack 2025 talks now available on PeerTube! (video.infosec.exchange)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 03 Oct 14:21
comments (1)
Vulnerability Report - September 2025
in cybersecurity@infosec.pub from cm0002@sh.itjust.works on 03 Oct 14:16
comments (0)
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:30
comments (0)
Red Hat confirms security incident after hackers breach GitLab instance (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:15
comments (0)
766,000 Impacted by Data Breach at Dealership Software Provider Motility - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 13:01
comments (0)
Japan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shipping (industrialcyber.co)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
Japan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shipping (industrialcyber.co)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 12:52
comments (0)
Clop extortion emails claim theft of Oracle E-Business Suite data (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:47
comments (0)
Renault UK Customer Records Stolen in Third-Party Breach (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:32
comments (5)
Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 12:17
comments (1)
Attacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warns (www.cyber.gc.ca)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 11:46
comments (0)
Attacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warns (www.cyber.gc.ca)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 03 Oct 11:45
comments (0)
State-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure" (breached.company)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
State-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure" (breached.company)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 03 Oct 08:19
comments (0)
New $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:16
comments (2)
Oracle customers being bombarded with emails claiming widespread data theft | CyberScoop (cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 19:02
comments (0)
South Korea raises cyber threat level after huge data centre fire sparks hacking fears | South Korea | The Guardian (www.theguardian.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:15
comments (0)
Red Hat repos raided, claims cybercrew, files stolen • The Register (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 14:01
comments (5)
US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:45
comments (1)
Hour-Long Email Phishing Breach Affects PHI of 150,000 (www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:31
comments (0)
Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247) - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:17
comments (0)
China Requires 1-Hour Cybersecurity-Incident Reports (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 13:03
comments (2)
US gov shutdown leaves IT projects hanging, security defenders a skeleton crew (go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 01 Oct 22:44
comments (2)
'Delightful' Red Hat OpenShift AI bug allows full takeover (go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 01 Oct 22:05
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 01 Oct 17:16
comments (4)
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 15:32
comments (13)
Smishing Campaigns Exploit Cellular Routers to Target Belgium - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:31
comments (0)
'Trifecta' of Gemini Flaws Turn AI Into Attack Vehicle (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:18
comments (0)
New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 11:02
comments (0)
SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:48
comments (0)
Industry groups worry about cyber info sharing as key US law is set to expire | Reuters (www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 10:30
comments (0)
Chinese hacking group ‘Phantom Taurus’ targets governments (www.telecomstechnews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (0)
Chinese hacking group ‘Phantom Taurus’ targets governments (www.telecomstechnews.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 01 Oct 06:03
comments (1)
Beijing-backed burglars master .NET to target government web servers (go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 01 Oct 05:43
comments (0)
50K Cisco firewalls remain vulnerable to advanced attacks (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 18:55
comments (1)
CISA kills agreement with nonprofit that runs MS-ISAC (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 18:52
comments (0)
Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 16:44
comments (0)
Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:45
comments (0)
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:31
comments (0)
National Cyber Authorities Launch OT Security Guidance - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:17
comments (0)
'You'll never need to work again': Criminals offer reporter money to hack BBC (www.bbc.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 13:01
comments (4)
Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:48
comments (0)
Canada’s WestJet notifies American travelers whose data was hacked in June breach (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 12:32
comments (1)
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 03:12
comments (7)
Tile exploit could let stalkers follow you with your own tracker — Bluetooth broadcasting flaw is relatively simple to exploit, researchers discover (www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 03:12
comments (3)
New Olymp Loader Malware-as-a-Service Promises Defender Bypass with Auto Certificate Signing (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:54
comments (0)
Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:26
comments (0)
Harrods Reveals Supply Chain Breach Impacting Online Customers (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 17:15
comments (0)
Google Ads Used to Spread Trojan Disguised as TradingView Premium (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:46
comments (1)
Medusa Ransomware Claims Comcast Data Breach, Demands $1.2M (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:34
comments (0)
New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 16:25
comments (0)
Fake Microsoft Teams installers push Oyster malware via malvertising (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 13:20
comments (0)
Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035) - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 12:36
comments (1)
Beijing's RedNovember hacked critical US, global orgs (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 Sep 11:35
comments (0)
Rainbet's $5000 bounty for a bug that could've cost them everything (blog.z.org)
in cybersecurity@sh.itjust.works from maxfield@lemmy.world on 28 Sep 21:12
comments (0)
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks (thehackernews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks (thehackernews.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Sep 11:10
comments (0)
Hacking Campaign Has Breached Cisco Devices in US Government (www.bloomberg.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Sep 17:33
comments (0)
Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Sep 00:41
comments (1)
Besides them trying to upsell me a new router, what does this mean?
in cybersecurity@sh.itjust.works from StarvingMartist@sh.itjust.works on 25 Sep 20:41
comments (13)
Exploring GrapheneOS secure allocator: Hardened Malloc (www.synacktiv.com)
in cybersecurity@sh.itjust.works from Andromxda@lemmy.dbzer0.com on 25 Sep 16:14
comments (0)
OnePlus leaves researchers on read over Android bug that exposes texts: Rapid7 warns flaw could let any app peek at your SMS, but smartphone vendor won't pick up (www.rapid7.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:09
comments (0)
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors (cloud.google.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Sep 16:03
comments (0)
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors (cloud.google.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 Sep 16:03
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Sep 15:46
comments (2)
ShadowV2 Botnet Infects AWS Docker Containers to Launch DDoS Campaign (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:44
comments (0)
New YiBackdoor Allows Attackers to Execute Arbitrary Commands and Exfiltrate Sensitive Data from Hacked Systems (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 13:31
comments (0)
NPM package caught using QR Code to fetch cookie-stealing malware (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 12:38
comments (0)