home groups about login help
Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwords (citizenlab.ca)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Jun 11:10
comments (0)
Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwords (citizenlab.ca)
in cybersecurity@infosec.pub from Pro@programming.dev on 19 Jun 10:56
comments (0)
North Korean hackers deepfake execs in Zoom call to spread Mac malware (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:32
comments (2)
New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains (thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:31
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Jun 16:21
comments (0)
Critical Vulnerability Patched in Citrix NetScaler (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 15:02
comments (0)
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 14:51
comments (0)
Telegram Messenger's Ties to Russia's FSB Revealed in New Report - Newsweek (www.newsweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:32
comments (10)
BeyondTrust warns of pre-auth RCE in Remote Support software (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:26
comments (0)
New Linux udisks flaw lets attackers get root on major Linux distros (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:18
comments (0)
Python Protobuf Flaw Allows DoS Via Nested Messages (securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:08
comments (0)
RapperBot Botnet Surges with 50,000+ Attacks Targeting Network Edge Devices (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:01
comments (0)
WormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Models (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:59
comments (5)
Taiwan Targeted In Sophisticated Malware Campaign Disguised As Tax Emails (informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:50
comments (0)
Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone number | Malwarebytes (www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:42
comments (7)
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:34
comments (2)
Scania confirms insurance claim data breach in extortion attempt (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:11
comments (0)
Zyxel Firewall Vulnerability Again in Attacker Crosshairs (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 11:54
comments (0)
A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator (intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jun 08:06
comments (0)
A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator (intel471.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 18 Jun 08:06
comments (0)
MDEAutomator: Open-source endpoint management, incident response in MDE (www.helpnetsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 21:09
comments (0)
BusKill Warrant Canary 2025-2026 (www.buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 17 Jun 19:13
comments (0)
Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:58
comments (5)
Threat Actor Abuses TeamFiltration for Entra ID Account Takeovers (www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:07
comments (0)
New Veeam RCE flaw lets domain users hack backup servers (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:40
comments (0)
Hacker steals 1 million Cock.li user records in webmail data breach (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:32
comments (0)
U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:26
comments (0)
Two Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and money (www.lighthousereports.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 17 Jun 14:12
comments (5)
Two Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and money (www.lighthousereports.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 17 Jun 14:12
comments (1)
New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 14:00
comments (0)
Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:56
comments (0)
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:49
comments (0)
New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:26
comments (0)
Kali Linux 2025.2 released with 13 new tools, car hacking updates (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:16
comments (0)
Washington Post Staffer Emails Targeted in Cyber Breach (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:10
comments (0)
Hackers switch to targeting U.S. insurance companies (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:00
comments (0)
Freedman Healthcare hacked, database software used by 27 state public health departments | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:56
comments (0)
Hackers claim attack on Scania, website down​ | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:49
comments (0)
PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:41
comments (1)
Scattered Spider, fresh off retail sector attack spree, pivots to insurance industry | CyberScoop (cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:32
comments (0)
Report Links Los Pollos and RichAds to Malware Traffic Operations (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 18:45
comments (0)
GrayAlpha Unmasked: New FIN7-Linked Infrastructure, PowerNet Loader, and Fake Update Attacks (www.recordedfuture.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:53
comments (0)
Washington Post's email system hacked, journalists' accounts compromised (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:45
comments (0)
Apple and Google Still Have a Chinese VPN Problem (www.techtransparencyproject.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:09
comments (0)
Apple and Google Still Have a Chinese VPN Problem (www.techtransparencyproject.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:10
comments (0)
Zoomcar discloses security breach impacting 8.4 million users (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 16:59
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Jun 12:41
comments (3)
BERT Ransomware Upgrades to Attacks Linux Machines Using Weaponized ELF Files (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:33
comments (0)
eSentire | Don't Get Caught in the Headlights - DeerStealer Analysis (www.esentire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:25
comments (0)
Microsoft: June Windows Server security updates cause DHCP issues (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:17
comments (1)
Google Play Store Alert: New Phishing Apps Bypass Security, Stealing Crypto Wallet Seeds (securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:10
comments (0)
Hackers Leak Data of 10,000 VirtualMacOSX Customers in Alleged Breach (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:01
comments (0)
Government offices in North Carolina, Georgia disrupted by cyberattacks | The Record from Recorded Future News (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:57
comments (0)
Over 46,000 Grafana instances exposed to account takeover bug (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:49
comments (0)
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:42
comments (0)
Ransomware Group Threatens to Dump Paraguayan Citizens' Data (www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:34
comments (0)
WestJet investigates cyberattack disrupting internal systems (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:25
comments (0)
A JPEG With A Payload (isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 16 Jun 11:19
comments (0)
A JPEG With A Payload (isc.sans.edu)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 16 Jun 11:18
comments (0)
Even paying victims lose their data with Anubis ransomware (www.techzine.eu)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 16 Jun 09:54
comments (1)
Google Cloud incident report (status.cloud.google.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jun 23:58
comments (2)
The Guardian, in collaboration with the University of Cambridge Department of Computer Science, launches open-source Secure Messaging (www.theguardian.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 15 Jun 22:29
comments (7)
Simplest way to back up password vault and 2FA Recovery Codes in android?
in cybersecurity@sh.itjust.works from darkguyman@lemmy.dbzer0.com on 15 Jun 12:41
comments (3)
Solar PV vulnerabilities (www.redhotcyber.com)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 15 Jun 10:41
comments (3)
Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Jun 04:52
comments (0)
Discord flaw lets hackers reuse expired invites in malware campaign (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from tonytins@pawb.social on 13 Jun 16:18
comments (0)
Apple confirmed that Messages app flaw was actively exploited in the wild (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:35
comments (0)
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs – Krebs on Security (krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:25
comments (0)
Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:09
comments (0)
Microsoft: KB5060533 update triggers boot errors on Surface Hub v1 devices (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:02
comments (0)
Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper | Trend Micro (US) (www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 13:57
comments (0)
Spanish arm of French insurance giant posted on hacker forum (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:40
comments (0)
Cloudflare: Outage not caused by security incident, data is safe (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:25
comments (2)
LockBit panel data leak shows Chinese orgs among the most targeted - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:18
comments (0)
NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073 (www.synacktiv.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:09
comments (0)
JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique (unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:00
comments (0)
New 'SmartAttack' Steals Air-Gapped Data Using Smartwatches - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:56
comments (3)
Hackers claim fresh T-Mobile data breach​ | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:50
comments (0)
Europol Says Criminal Demand for Data is “Skyrocketing” (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:37
comments (0)
GCVE-BCP-03 - Decentralized Publication Standard implemented in Vulnerability-Lookup
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Jun 09:19
comments (0)
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider (www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 13 Jun 00:49
comments (0)
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider (www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 13 Jun 00:49
comments (0)
Internet cut affects Google Cloud and impacts services worldwide (www.thenationalnews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 22:52
comments (2)
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery (research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 16:45
comments (0)
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery (research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 16:44
comments (0)
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 16:39
comments (5)
The Citizen Lab: Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted (citizenlab.ca)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Jun 15:57
comments (0)
Urgent Firefox Alert: Critical Memory Corruption Flaws (CVSS 9.8) Allow Remote Code Execution (securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 14:01
comments (7)
GitLab patches high severity account takeover, missing auth issues (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:57
comments (0)
Stealth Falcon APT Exploits Microsoft RCE Zero-Day (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:48
comments (0)
OWASP Nettacker: Open-source scanner for recon and vulnerability assessment - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:42
comments (0)
NIST touts 19 ways to build "off the shelf" Zero Trust Architecture in new guidance | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:26
comments (1)
Erie Insurance confirms cyberattack behind business disruptions (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:17
comments (1)
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:10
comments (0)
Global analysis of Adversary-in-the-Middle phishing threats - Sekoia.io Blog (blog.sekoia.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:03
comments (0)
New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 12:58
comments (0)
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted (citizenlab.ca)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 12:38
comments (0)
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted (citizenlab.ca)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 12:37
comments (0)
Russian hybrid warfare: Ukraine's success offers lessons for Europe (www.atlanticcouncil.org)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 12 Jun 07:19
comments (0)
Russian hybrid warfare: Ukraine's success offers lessons for Europe (www.atlanticcouncil.org)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 12 Jun 07:18
comments (0)
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown (www.interpol.int)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 04:11
comments (0)
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown (www.interpol.int)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 04:10
comments (1)
Researchers find the first known “zero-click” attack on an AI agent; the now-fixed flaw in Microsoft 365 Copilot would let a hacker attack a user via an email (www.aim.security)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 18:48
comments (1)
Researchers find the first known “zero-click” attack on an AI agent; the now-fixed flaw in Microsoft 365 Copilot would let a hacker attack a user via an email (www.aim.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 18:48
comments (0)
New Secure Boot flaw lets attackers install bootkit malware, patch now (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 18:03
comments (1)
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:58
comments (0)
Hackers exploited Windows WebDav zero-day to drop malware (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:50
comments (0)
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:41
comments (1)
Salesforce Industry Cloud Hit by 20 Vulnerabilities Including 0days (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:24
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Jun 13:39
comments (0)
Why would you want to sign your commits with PGP? Is SSH insufficient?
in cybersecurity@sh.itjust.works from Custodian6718@programming.dev on 11 Jun 13:23
comments (6)
“Oral pleasure” app potentially leaks millions of messages and GPS locations (cybernews.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:58
comments (2)
“Oral pleasure” app potentially leaks millions of messages and GPS locations (cybernews.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:58
comments (0)
New BrowserVenom malware being distributed via fake DeepSeek phishing website (securelist.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:42
comments (1)
New BrowserVenom malware being distributed via fake DeepSeek phishing website (securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:42
comments (0)
Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:40
comments (0)
84% of Organizations’ SOC Analysts are Unknowingly Investigating the Same Incidents (www.globenewswire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:32
comments (2)
VU#211341 - A vulnerability in Insyde H2O UEFI application allows for digital certificate injection via NVRAM variable (kb.cert.org)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:26
comments (0)
40,000 cameras expose feeds to datacenters, health clinics • The Register (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:18
comments (4)
Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery - DomainTools Investigations | DTI (dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:09
comments (0)
Ivanti Workspace Control hardcoded key flaws expose SQL credentials (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:58
comments (0)
Trove of port agency’s data stolen, hackers claim | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:48
comments (0)
Facebook malvertising reveals 4K domains spoofing 68 brands | SC Media (www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:42
comments (0)
June 2025 Patch Tuesday: Microsoft Fixes 66 Bugs, Including Active 0-Day (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:32
comments (2)
CISO who helped unmask Badbox warns: Version 3 is coming (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Jun 08:28
comments (0)
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage. (research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 10 Jun 22:04
comments (0)
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage. (research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Jun 22:03
comments (0)
New Secure Boot flaw lets attackers install bootkit malware, patch now (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 20:59
comments (0)
FIN6 hackers pose as job seekers to backdoor recruiters’ devices (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 18:34
comments (0)
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:49
comments (0)
Critical Vulnerability Patched in SAP NetWeaver - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:42
comments (0)
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:32
comments (0)
Massive Heroku outage impacts web platforms worldwide (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:24
comments (0)
CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:16
comments (0)
Texas Dept. of Transportation breached, 300k crash records stolen (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:53
comments (0)
FIN6 hackers pose as job seekers to backdoor recruiters’ devices (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:36
comments (1)
New Zealand Government Mandates DMARC Under New Secure Email Framework - Security Boulevard (securityboulevard.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:41
comments (0)
PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:34
comments (0)
Nearly 300,000 crash records stolen from Texas transportation department | The Record from Recorded Future News (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:25
comments (0)
Resecurity | APT 41: Threat Intelligence Report and Malware Analysis (www.resecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:16
comments (0)
Cyfirma Industry Report – Energy & Utilities - Cyfirma (www.cyfirma.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:11
comments (0)
Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability | Akamai (www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:02
comments (0)
Hidden Backdoors in npm Packages Let Attackers Wipe Entire Systems (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:58
comments (1)
Google Vulnerability Allowed Hackers to Access User Phone Numbers (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:49
comments (0)
Sensata Technologies says personal data stolen by ransomware gang (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:40
comments (0)
SentinelOne shares new details on China-linked breach attempt (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:34
comments (0)
Chinese spy crew appears to be preparing for conflict by backdooring more than 70 critical organizations worldwide (www.theregister.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:54
comments (0)
Chinese spy crew appears to be preparing for conflict by backdooring more than 70 critical organizations worldwide (www.theregister.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:53
comments (4)
Sensata Technologies says personal data stolen by ransomware gang (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:07
comments (0)
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:04
comments (1)
Is Lynis (audit tool) worth using in 2025?
in cybersecurity@sh.itjust.works from OhVenus_Baby@lemmy.ml on 09 Jun 23:57
comments (2)
US infrastructure could crumble under cyberattack, ex-NSA advisor warns (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 22:11
comments (5)
Grocery wholesale giant United Natural Foods hit by cyberattack (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:51
comments (0)
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:42
comments (0)
BadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warns (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:35
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Jun 17:28
comments (0)
New Salesforce SOQL Injection 0-Day Vulnerability Exposes Millions of Deployments (cyberpress.org)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:25
comments (1)
New DuplexSpy RAT Gives Attackers Full Control Over Windows Machines (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:02
comments (0)
Chinese Hackers Infiltrated U.S. Telecom Networks a Year Earlier Than Previously Known (www.apextechservices.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:42
comments (0)
Operation DRAGONCLONE: Chinese Telecom Targeted by VELETRIX & VShell Malware (www.seqrite.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:33
comments (0)
Over 20 Malicious Apps on Google Play Target Users for Seed Phrases (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:26
comments (0)
Tax resolution firm Optima Tax Relief hit by ransomware, data leaked (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:18
comments (0)
EU Prepares for Transnational Cyberattacks - BankInfoSecurity (www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:10
comments (0)
Malware found in NPM packages with 1 million weekly downloads (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 11:52
comments (4)
Librarian Ghouls carry out attacks with data theft and crypto miner deployment (securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 09 Jun 11:18
comments (1)
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 05:04
comments (0)
ChatGPT used to disable SecureBoot in locked-down device – modded BIOS reflash facilitated fresh Windows and Linux installs (www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Jun 19:21
comments (10)
Cybercriminals turn to “residential proxy” services to hide malicious traffic (arstechnica.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 08 Jun 12:50
comments (1)
Millions of low-cost Android devices turn home networks into crime platforms (arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jun 18:20
comments (0)
Scattered Spider Uses Tech Vendor Impersonation to Target Helpdesks - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 18:08
comments (0)
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 18:00
comments (0)
Booking.com reservation abused as cybercriminals steal from travelers | Malwarebytes (www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:57
comments (0)
Pro-Russia group hits Ukraine with fresh wiper malware • The Register (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:49
comments (0)
Kettering Health confirms Interlock ransomware behind cyberattack (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:40
comments (0)
Critical Fortinet flaws now exploited in Qilin ransomware attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:32
comments (0)
HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:11
comments (0)
New Chaos RAT Targets Linux and Windows Users to Steal Sensitive Data (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:02
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Jun 14:25
comments (0)
Iranian APT 'BladedFeline' Hides in Network for 8 Years (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:35
comments (0)
U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:26
comments (1)
Proxy Services Feast on Ukraine’s IP Address Exodus – Krebs on Security (krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:16
comments (0)
Nearly 94 Billion Stolen Cookies Found on Dark Web (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:10
comments (4)
PoC Exploit Released for Apache Tomcat DoS Vulnerability (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:01
comments (0)
New Zero-Click iPhone Exploit “NICKNAME” Targeted High-Profile Individuals Across the US and EU (securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:57
comments (0)
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:49
comments (0)
AI-Powered Website Cloning: Same Tool Enables Automated Phishing at Scale (www.netcraft.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:41
comments (0)
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:34
comments (1)
FBI: BADBOX 2.0 Android malware infects millions of consumer devices (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:24
comments (2)
Unsecured Database Exposes Data of 3.6 Million Passion.io Creators (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:18
comments (0)
UK tax authority reveals scammers stole £47 million | The Record from Recorded Future News (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:10
comments (0)
Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Jun 01:58
comments (1)
Home Internet Connected Devices Facilitate Criminal Activity (www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 20:38
comments (1)
Evidence of Zero-Click iPhones Exploitation Uncovered in the U.S. (iverify.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 17:58
comments (2)
More than a hundred backdoored malware repos traced to single GitHub user (news.sophos.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Jun 16:08
comments (1)
More than a hundred backdoored malware repos traced to single GitHub user (news.sophos.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 16:06
comments (0)
Exploiting Clickfix: AMOS macOS Stealer Evades Security to Deploy Malicious Code (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 13:17
comments (0)
Vodafone Germany Fined $51 Million Over Privacy, Security Failures - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 12:43
comments (0)
The strange tale of ischhfd83: When cybercriminals eat their own (news.sophos.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 12:37
comments (0)
Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 12:34
comments (0)
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine (blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 12:25
comments (0)