home groups about login help
Texas Cyber Command will mean ‘expanding’ cybersecurity help, state official says (www.route-fifty.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 28 May 21:54
comments (0)
Czech Republic accuses China’s APT31 of a cyberattack on its Foreign Ministry (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:58
comments (0)
Interlock ransomware gang deploys new NodeSnake RAT on universities (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:58
comments (0)
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:38
comments (2)
GitHub becomes go-to platform for malware delivery across Europe - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:56
comments (0)
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:49
comments (0)
Vulnerabilities found in NASA's open source software - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:08
comments (0)
MATLAB dev confirms ransomware attack behind service outage (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:00
comments (0)
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News (news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 16:32
comments (0)
Governments Urge Organizations to Prioritize SIEM/SOAR Adoption - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 16:08
comments (1)
94 billion browser cookies sold on Telegram​ | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 15:56
comments (2)
OneDrive File Picker Flaw Provides ChatGPT and Other Web Apps Full Read Access to Users’ Entire OneDrive (www.oasis.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 15:23
comments (0)
Evolution of Zanubis, a banking Trojan for Android (securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 14:18
comments (0)
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites (cloud.google.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 08:22
comments (0)
UK Envoy Urges Transatlantic Tech Alliance, Cites China Threat (www.bloomberg.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 May 06:00
comments (0)
UK Envoy Urges Transatlantic Tech Alliance, Cites China Threat (www.bloomberg.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 06:00
comments (0)
Dutch intelligence report says Russian hacker group stole data on 63,000 police officers, targeted NATO government systems (theins.ru)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 05:45
comments (0)
Dutch intelligence report says Russian hacker group stole data on 63,000 police officers, targeted NATO government systems (theins.ru)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 May 05:44
comments (0)
Don't click on that Facebook ad for a text-to-AI-video tool (go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 May 02:00
comments (5)
BIOS under attack: hackers increasingly focus on boot threats (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:36
comments (6)
Major AT&T leak exposed 31M records, hackers claim (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:30
comments (0)
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:08
comments (0)
Coca-Cola, Bottling Partner Named in Separate Ransomware and Data Breach Claims (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:57
comments (0)
GitHub MCP Server Vulnerability Let Attackers Access Private Repositories (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:43
comments (0)
Malicious Machine Learning Model Attack Discovered on PyPI (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:26
comments (0)
Adidas warns of data breach after customer service provider hack (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:20
comments (0)
Windows Server emergency update fixes Hyper-V VM freezes, restart issues (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:16
comments (1)
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:09
comments (0)
New Attack Bypasses HTTP/2 Security for Arbitrary Cross-Site Scripting (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 17:55
comments (1)
CISA loses nearly all top officials as purge continues (www.cybersecuritydive.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 18:23
comments (3)
NIST Introduces New Metric to Measure Likelihood of Vulnerability Exploits (www.infosecurity-magazine.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 15:50
comments (0)
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage (www.microsoft.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 May 11:06
comments (0)
Intercept and Monitor TLS Traffic with mitmproxy Using Podman - Infosec.Pub (infosec.pub)
in cybersecurity@sh.itjust.works from starkzarn@infosec.pub on 26 May 18:16
comments (0)
Multiple French govt institutions’ emails, passwords exposed, hackers claim (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 12:31
comments (1)
NIST proposes new metric to gauge exploited vulnerabilities - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 12:08
comments (0)
FBI Warns of Silent Ransom Group Targeting Law Firms via Scam Calls (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 11:49
comments (2)
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage (www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 May 11:06
comments (0)
Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords (www.websiteplanet.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 16:11
comments (0)
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft (www.legitsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 16:11
comments (0)
Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials (www.wired.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 May 17:45
comments (1)
Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack (blog.kandji.io)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 May 12:43
comments (0)
Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack (blog.kandji.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 May 12:44
comments (0)
A local server designed to load one or more pre-trained NLP models during startup and expose them through a clean, RESTful API (github.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 14:17
comments (1)
270 arrested in global dark web crackdown targeting online drug and criminal networks | Europol (www.europol.europa.eu)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 14:01
comments (0)
German Cyber Agency Sounds Warning on Grid Vulnerabilities across Europe (www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 23 May 13:08
comments (6)
German Cyber Agency Sounds Warning on Grid Vulnerabilities across Europe (www.bankinfosecurity.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 13:08
comments (2)
DanaBot malware disrupted, threat actors named (intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 May 06:46
comments (0)
Denmark finds ‘suspicious’ components in key infrastructure imports, raising concerns about espionage and energy security
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 06:00
comments (0)
Denmark finds ‘suspicious’ components in key infrastructure imports, raising concerns about espionage and energy security
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 23 May 06:00
comments (5)
Chinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report says (gbhackers.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 22 May 16:32
comments (0)
Chinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report says (gbhackers.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 22 May 16:31
comments (0)
Hacker who breached communications app used by Trump aide stole data from across US government (www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 14:42
comments (1)
Pandas Galore: Chinese Hackers Boost Attacks in Latin America (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 14:24
comments (0)
Unpatched Windows Server Flaw Threatens Active Directory Users (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 13:55
comments (0)
Russian hackers breach orgs to track aid routes to Ukraine (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 13:54
comments (0)
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS (krebsonsecurity.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 May 09:22
comments (3)
“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall (arstechnica.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 22 May 04:12
comments (5)
Lumma infostealer malware operation disrupted, 2,300 domains seized (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 May 19:11
comments (0)
New Variant of Crypto Confidence Scam (isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 18:19
comments (0)
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations (www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 21 May 17:51
comments (0)
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations (www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 17:51
comments (0)
The US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear. (www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 21 May 16:19
comments (0)
The US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear. (www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 16:18
comments (0)
Dero miner spreads inside containerized Linux environments (securelist.com)
in cybersecurity@infosec.pub from cm0002@lemmy.sdf.org on 21 May 13:32
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 May 11:35
comments (1)
SK Telecom says malware breach lasted 3 years, impacted 27 million numbers (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 19:31
comments (1)
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website (research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 May 18:10
comments (0)
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website (research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 May 18:09
comments (0)
New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 17:35
comments (0)
EU High Level Group (established by EU commission) recommends forcing all devices in the EU to be sold with ”integrated Law Enforcement access” and sanctioning non-EU approved messaging services (home-affairs.ec.europa.eu)
in cybersecurity@sh.itjust.works from deinu@sh.itjust.works on 20 May 17:16
comments (6)
Service desks are under attack: What can you do about it? (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:52
comments (1)
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:47
comments (1)
LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:39
comments (0)
RVTools hit in supply chain attack to deliver Bumblebee malware (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:32
comments (0)
RVTools hit in supply chain attack to deliver Bumblebee malware (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 15:24
comments (0)
Interlock ransomware evolving under the radar (blog.sekoia.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 13:02
comments (0)
DDoSecrets Adds 410GB of TeleMessage Breach Data to Index (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:34
comments (2)
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:23
comments (2)
Windows 10 emergency updates fix BitLocker recovery issues (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:11
comments (1)
O2 UK patches bug leaking mobile user location from call metadata (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 11:55
comments (0)
All things infostealers. Week 20, 2025 – Kinda Blog by CryptoLek (cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 20 May 10:54
comments (0)
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server (micahflee.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 01:16
comments (5)
Japan passed a law allowing preemptive offensive cyber actions (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 18:11
comments (1)
Top 5 Advances in Unsupervised Learning for Cybersecurity (rackenzik.com)
in cybersecurity@infosec.pub from Rackenzik@lemmy.sdf.org on 19 May 17:09
comments (0)
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:59
comments (0)
Ransomware gang INC claims recent attack on South African Airways - Comparitech (www.comparitech.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:28
comments (0)
Russian APT Exploiting Mail Servers Against Government, Defense Organizations (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:22
comments (0)
Ransomware gangs increasingly use Skitnet post-exploitation malware (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:14
comments (0)
Massive data leak: 200 billion files exposed in cloud buckets (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 14:23
comments (0)
New 'Defendnot' tool tricks Windows into disabling Microsoft Defender (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 14:12
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 May 13:00
comments (0)
VMware Hacked As $150,000 Zero-Day Exploit Dropped (www.forbes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 12:59
comments (3)
Detecting malicious Unicode (daniel.haxx.se)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 12:55
comments (0)
USN-7292-1: Dropbear vulnerabilities | Ubuntu security notices | Ubuntu (ubuntu.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 12:52
comments (0)
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted (www.justice.gov)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 12:52
comments (0)
How Scattered Spider TTPs are evolving in 2025 (pushsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 11:05
comments (0)
Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraine (web.archive.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 May 07:37
comments (0)
Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraine (web.archive.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 07:35
comments (0)
Russian hackers are interested in chaos and money, says NATO cyber defense director (news.err.ee)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 06:57
comments (0)
Russian hackers are interested in chaos and money, says NATO cyber defense director (news.err.ee)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 May 06:57
comments (1)
Healthcare Cyber-Attacks Intensify, Sector Now Prime Target (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 13:20
comments (1)
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:25
comments (0)
Windows Defender Application Control Bypassed Using Operationalizing Browser Exploits (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:16
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 May 12:06
comments (2)
FrigidStealer Malware Hits macOS Users via Fake Safari Browser Updates (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:05
comments (1)
Divine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australia (www.defenceconnect.com.au)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 May 05:41
comments (0)
Divine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australia (www.defenceconnect.com.au)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 May 05:40
comments (1)
Technical Analysis of TransferLoader (www.zscaler.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 18:25
comments (0)
Coinbase data breach exposes customer info and government IDs (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 16:51
comments (3)
U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalog (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 14:52
comments (0)
U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 14:52
comments (0)
Global cybersecurity readiness remains critically low - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 14:26
comments (0)
Russia-linked hackers target webmail servers in Ukraine-related espionage operation - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 13:45
comments (0)
AI transforms cybercrime: researchers warn about the rise of AI agent hackers (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 13:23
comments (0)
HTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systems (cyberpress.org)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 13:14
comments (0)
Google fixes high severity Chrome flaw with public exploit (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 12:52
comments (1)
Ransomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Says (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 12:24
comments (0)
Google says hackers behind UK retail cyber campaign now also targeting US (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 12:03
comments (0)
Cybersecurity incident forces largest US steelmaker to take some operations offline (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 May 11:55
comments (0)
Ransomware gangs join ongoing SAP NetWeaver attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 18:05
comments (0)
Insight: Rogue communication devices found in Chinese solar power inverters (www.reuters.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 14 May 15:07
comments (0)
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabia (blog.eclecticiq.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 14 May 13:49
comments (0)
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabia (blog.eclecticiq.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 14 May 13:49
comments (0)
89 million Steam account details just got leaked, so now's a good time to change your password (www.xda-developers.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 May 13:42
comments (13)
Hackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwords (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 12:57
comments (4)
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 12:39
comments (1)
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 12:30
comments (1)
Australian Human Rights Commission Data Breach Exposes Sensitive Documents Submitted via Website (securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 12:11
comments (0)
Vulnerabilities Patched by Juniper, VMware and Zoom (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 12:06
comments (0)
SAP patches second zero-day flaw exploited in recent attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 11:48
comments (0)
Twilio denies breach following leak of alleged Steam 2FA codes (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 May 11:37
comments (2)
Researchers discover new security vulnerability in Intel processors (ethz.ch)
in cybersecurity@infosec.pub from Pro@programming.dev on 14 May 11:09
comments (0)
As US vuln-tracking falters, EU enters with its own security bug database (www.theregister.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 14 May 10:02
comments (0)
Intel data-leaking Spectre defenses scared off once again (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 13 May 22:53
comments (0)
RSS feed for CISA KEV vulnerabilities, powered by Vulnerability-Lookup (www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 20:58
comments (0)
Microsoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flaws (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 18:27
comments (0)
Government email alert system GovDelivery used to send scam messages (techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 13 May 18:26
comments (0)
UK Considers New Enterprise IoT Security Law (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 16:35
comments (0)
New Intel CPU flaws leak sensitive data from privileged memory (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 16:33
comments (1)
Britain’s intelligence services see “direct connection between Russian cyber attacks and physical threats to our security" (therecord.media)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 May 16:10
comments (0)
Britain’s intelligence services see “direct connection between Russian cyber attacks and physical threats to our security" (therecord.media)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 May 16:09
comments (2)
North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 13:43
comments (0)
Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 13:43
comments (0)
Scattered Spider Launches Supply Chain Attacks on UK Retail Organizations (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 13:41
comments (0)
F5 BIG-IP Vulnerability Allows Remote Command Execution (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 13:41
comments (0)
PoC Released: CVE-2025-31258 Sandbox Escape in macOS via RemoteViewServices (securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 13:36
comments (0)
Spain investigates cyber weaknesses at small power plants after blackout, FT reports (www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:16
comments (0)
Cybercriminals Hide Undetectable Ransomware Inside JPG Images (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:12
comments (10)
Phishing Scams on the Rise with Sophisticated PhaaS Toolkits and Realistic Fake Pages (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:12
comments (0)
Hackers Weaponizing PDF Invoices to Attack Windows, Linux & macOS Systems (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:11
comments (0)
Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:10
comments (0)
You think ransomware is bad? Wait until it infects CPUs (www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:10
comments (2)
A Subtle Form of Siege: DDoS Smokescreens as a Cover for Quiet Data Breaches (www.tripwire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:10
comments (1)
European Vulnerability Database Launches Amid US CVE Chaos (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:09
comments (8)
4 Hackers Arrested After Millions Made in Global Botnet Business (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:08
comments (0)
Apple Patches Major Security Flaws in iOS, macOS Platforms (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:07
comments (0)
Fake image-to-video AI sites deliver novel ‘Noodlophile’ infostealer (www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:06
comments (1)
Airline carrying out deportation flights confirms cyberattack to SEC (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 May 12:06
comments (0)
CISA mutes own website, shifts routine cyber alerts to Musk’s X, RSS, email • The Register (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 06:21
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 May 18:54
comments (1)
Microsoft introduces huge security risk in OneDrive (www.techzine.eu)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 12 May 15:40
comments (7)
Unending ransomware attacks are a symptom, not the illness (www.theregister.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 12 May 15:16
comments (8)
437,000 Impacted by Ascension Health Data Breach (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 12:27
comments (0)
Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 12:21
comments (1)
Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 12:21
comments (0)
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials (socket.dev)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 11:04
comments (0)
Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 11:01
comments (1)
7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 11:00
comments (0)
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 09:14
comments (0)
Cybercriminal services target end-of-life routers, FBI warns (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 09:13
comments (4)
One-Click RCE in ASUS’s Preinstalled Driver Software (mrbruh.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 09:10
comments (1)
iClicker site hack targeted students with malware via fake CAPTCHA (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 May 09:08
comments (0)
Textbook and testing giant Pearson hit by cyberattack, customer data leaked (www.techradar.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 May 18:18
comments (2)
Nvidia RTX 5090 can crack an 8-digit passcode in just 3 hours — password cracking benchmarks show tremendous performance (www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 21:15
comments (9)
Supply chain attack hits npm package with 45,000 weekly downloads (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 14:51
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 May 12:57
comments (0)
SAP Zero-Day Targeted Since January, Many Sectors Impacted (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:17
comments (2)
Russia-linked ColdRiver used LostKeys malware in recent attacks (securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:16
comments (0)
LockBit hacked: What does the leaked data show? - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:14
comments (0)
Legacy Login in Microsoft Entra ID Exploited to Breach Cloud Accounts (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:13
comments (0)
Education giant Pearson hit by cyberattack exposing customer data (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:11
comments (3)
DOGE software engineer’s computer infected by info-stealing malware (arstechnica.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:10
comments (19)
Kickidler employee monitoring software abused in ransomware attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:09
comments (1)
Spam campaign targeting Brazil abuses Remote Monitoring and Management tools (blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:06
comments (0)
Attacks surge against antiquated routers, FBI warns (www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 May 12:04
comments (2)
Kickidler employee monitoring software abused in ransomware attacks (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 01:12
comments (0)
DOGE software engineer’s computer infected by info-stealing malware (arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 22:02
comments (13)
Operation PowerOFF Takes Down 9 DDoS Domains (www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 19:09
comments (0)
The many variants of the ClickFix social engineering tactic - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 17:21
comments (1)
CVE-2025-23123 (CVSS 10): Critical UniFi Protect Cameras Flaw Demands Immediate Updates (securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 17:18
comments (3)
OneDrive New Feature Allows Default Sync of Personal & Corporate Accounts (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 14:41
comments (3)
Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 12:07
comments (0)
The Top Threat Actor Groups Targeting the Financial Sector (flashpoint.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:48
comments (0)
Six DDoS sites seized in multi-national law enforcement operation (cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:47
comments (0)
Play ransomware exploited Windows logging flaw in zero-day attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:43
comments (0)
LockBit ransomware gang hacked, victim negotiations exposed (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:42
comments (0)
UK under assault as number of ‘significant’ cyberattacks doubles: Foreign powers, ransomware gangs, AI threats drive surge in incidents affecting private businesses and government systems (www.thetimes.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 08 May 11:40
comments (0)
CISA warns of hackers targeting critical oil infrastructure (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:40
comments (1)
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:40
comments (0)
Ransomware spike exposes cracks in cloud security - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 May 11:39
comments (0)