Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwords
(citizenlab.ca)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Jun 11:10
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Jun 11:10
comments (0)
Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwords
(citizenlab.ca)
in cybersecurity@infosec.pub from Pro@programming.dev on 19 Jun 10:56
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 19 Jun 10:56
comments (0)
North Korean hackers deepfake execs in Zoom call to spread Mac malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:32
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:32
comments (2)
New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:31
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:31
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Jun 16:21
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Jun 16:21
comments (0)
Critical Vulnerability Patched in Citrix NetScaler
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 15:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 15:02
comments (0)
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 14:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 14:51
comments (0)
Telegram Messenger's Ties to Russia's FSB Revealed in New Report - Newsweek
(www.newsweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:32
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:32
comments (10)
BeyondTrust warns of pre-auth RCE in Remote Support software
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:26
comments (0)
New Linux udisks flaw lets attackers get root on major Linux distros
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:18
comments (0)
Python Protobuf Flaw Allows DoS Via Nested Messages
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:08
comments (0)
RapperBot Botnet Surges with 50,000+ Attacks Targeting Network Edge Devices
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 13:01
comments (0)
WormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Models
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:59
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:59
comments (5)
Taiwan Targeted In Sophisticated Malware Campaign Disguised As Tax Emails
(informationsecuritybuzz.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:50
comments (0)
Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone number | Malwarebytes
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:42
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:42
comments (7)
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:34
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:34
comments (2)
Scania confirms insurance claim data breach in extortion attempt
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 12:11
comments (0)
Zyxel Firewall Vulnerability Again in Attacker Crosshairs
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 11:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 18 Jun 11:54
comments (0)
A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jun 08:06
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jun 08:06
comments (0)
A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator
(intel471.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 18 Jun 08:06
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 18 Jun 08:06
comments (0)
MDEAutomator: Open-source endpoint management, incident response in MDE
(www.helpnetsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 21:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 21:09
comments (0)
BusKill Warrant Canary 2025-2026
(www.buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 17 Jun 19:13
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 17 Jun 19:13
comments (0)
Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:58
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:58
comments (5)
Threat Actor Abuses TeamFiltration for Entra ID Account Takeovers
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:07
comments (0)
New Veeam RCE flaw lets domain users hack backup servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:40
comments (0)
Hacker steals 1 million Cock.li user records in webmail data breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:32
comments (0)
U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 16:26
comments (0)
Two Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and money
(www.lighthousereports.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 17 Jun 14:12
comments (5)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 17 Jun 14:12
comments (5)
Two Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and money
(www.lighthousereports.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 17 Jun 14:12
comments (1)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 17 Jun 14:12
comments (1)
New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 14:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 14:00
comments (0)
Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:56
comments (0)
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 13:49
comments (0)
New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:26
comments (0)
Kali Linux 2025.2 released with 13 new tools, car hacking updates
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:16
comments (0)
Washington Post Staffer Emails Targeted in Cyber Breach
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:10
comments (0)
Hackers switch to targeting U.S. insurance companies
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 12:00
comments (0)
Freedman Healthcare hacked, database software used by 27 state public health departments | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:56
comments (0)
Hackers claim attack on Scania, website down | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:49
comments (0)
PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:41
comments (1)
Scattered Spider, fresh off retail sector attack spree, pivots to insurance industry | CyberScoop
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 11:32
comments (0)
Report Links Los Pollos and RichAds to Malware Traffic Operations
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 18:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 18:45
comments (0)
GrayAlpha Unmasked: New FIN7-Linked Infrastructure, PowerNet Loader, and Fake Update Attacks
(www.recordedfuture.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:53
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:53
comments (0)
Washington Post's email system hacked, journalists' accounts compromised
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 17:45
comments (0)
Apple and Google Still Have a Chinese VPN Problem
(www.techtransparencyproject.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:09
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:09
comments (0)
Apple and Google Still Have a Chinese VPN Problem
(www.techtransparencyproject.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:10
comments (0)
Zoomcar discloses security breach impacting 8.4 million users
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 16:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 16:59
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Jun 12:41
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Jun 12:41
comments (3)
BERT Ransomware Upgrades to Attacks Linux Machines Using Weaponized ELF Files
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:33
comments (0)
eSentire | Don't Get Caught in the Headlights - DeerStealer Analysis
(www.esentire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:25
comments (0)
Microsoft: June Windows Server security updates cause DHCP issues
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:17
comments (1)
Google Play Store Alert: New Phishing Apps Bypass Security, Stealing Crypto Wallet Seeds
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:10
comments (0)
Hackers Leak Data of 10,000 VirtualMacOSX Customers in Alleged Breach
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 12:01
comments (0)
Government offices in North Carolina, Georgia disrupted by cyberattacks | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:57
comments (0)
Over 46,000 Grafana instances exposed to account takeover bug
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:49
comments (0)
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:42
comments (0)
Ransomware Group Threatens to Dump Paraguayan Citizens' Data
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:34
comments (0)
WestJet investigates cyberattack disrupting internal systems
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jun 11:25
comments (0)
A JPEG With A Payload
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 16 Jun 11:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 16 Jun 11:19
comments (0)
A JPEG With A Payload
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 16 Jun 11:18
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 16 Jun 11:18
comments (0)
Even paying victims lose their data with Anubis ransomware
(www.techzine.eu)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 16 Jun 09:54
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 16 Jun 09:54
comments (1)
Google Cloud incident report
(status.cloud.google.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jun 23:58
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Jun 23:58
comments (2)
The Guardian, in collaboration with the University of Cambridge Department of Computer Science, launches open-source Secure Messaging
(www.theguardian.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 15 Jun 22:29
comments (7)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 15 Jun 22:29
comments (7)
Simplest way to back up password vault and 2FA Recovery Codes in android?
in cybersecurity@sh.itjust.works from darkguyman@lemmy.dbzer0.com on 15 Jun 12:41
comments (3)
in cybersecurity@sh.itjust.works from darkguyman@lemmy.dbzer0.com on 15 Jun 12:41
comments (3)
Solar PV vulnerabilities
(www.redhotcyber.com)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 15 Jun 10:41
comments (3)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 15 Jun 10:41
comments (3)
Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Jun 04:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Jun 04:52
comments (0)
Discord flaw lets hackers reuse expired invites in malware campaign
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from tonytins@pawb.social on 13 Jun 16:18
comments (0)
in cybersecurity@sh.itjust.works from tonytins@pawb.social on 13 Jun 16:18
comments (0)
Apple confirmed that Messages app flaw was actively exploited in the wild
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:35
comments (0)
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:25
comments (0)
Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:09
comments (0)
Microsoft: KB5060533 update triggers boot errors on Surface Hub v1 devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 14:02
comments (0)
Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper | Trend Micro (US)
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 13:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 13:57
comments (0)
Spanish arm of French insurance giant posted on hacker forum
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:40
comments (0)
Cloudflare: Outage not caused by security incident, data is safe
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:25
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:25
comments (2)
LockBit panel data leak shows Chinese orgs among the most targeted - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:18
comments (0)
NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073
(www.synacktiv.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:09
comments (0)
JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
(unit42.paloaltonetworks.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 12:00
comments (0)
New 'SmartAttack' Steals Air-Gapped Data Using Smartwatches - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:56
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:56
comments (3)
Hackers claim fresh T-Mobile data breach | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:50
comments (0)
Europol Says Criminal Demand for Data is “Skyrocketing”
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Jun 11:37
comments (0)
GCVE-BCP-03 - Decentralized Publication Standard implemented in Vulnerability-Lookup
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Jun 09:19
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Jun 09:19
comments (0)
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 13 Jun 00:49
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 13 Jun 00:49
comments (0)
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 13 Jun 00:49
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 13 Jun 00:49
comments (0)
Internet cut affects Google Cloud and impacts services worldwide
(www.thenationalnews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 22:52
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 22:52
comments (2)
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 16:45
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 16:45
comments (0)
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 16:44
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 16:44
comments (0)
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 16:39
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 16:39
comments (5)
The Citizen Lab: Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
(citizenlab.ca)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Jun 15:57
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Jun 15:57
comments (0)
Urgent Firefox Alert: Critical Memory Corruption Flaws (CVSS 9.8) Allow Remote Code Execution
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 14:01
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 14:01
comments (7)
GitLab patches high severity account takeover, missing auth issues
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:57
comments (0)
Stealth Falcon APT Exploits Microsoft RCE Zero-Day
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:48
comments (0)
OWASP Nettacker: Open-source scanner for recon and vulnerability assessment - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:42
comments (0)
NIST touts 19 ways to build "off the shelf" Zero Trust Architecture in new guidance | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:26
comments (1)
Erie Insurance confirms cyberattack behind business disruptions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:17
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:17
comments (1)
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:10
comments (0)
Global analysis of Adversary-in-the-Middle phishing threats - Sekoia.io Blog
(blog.sekoia.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 13:03
comments (0)
New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 12:58
comments (0)
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
(citizenlab.ca)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 12:38
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 12:38
comments (0)
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
(citizenlab.ca)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 12:37
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 12:37
comments (0)
Russian hybrid warfare: Ukraine's success offers lessons for Europe
(www.atlanticcouncil.org)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 12 Jun 07:19
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 12 Jun 07:19
comments (0)
Russian hybrid warfare: Ukraine's success offers lessons for Europe
(www.atlanticcouncil.org)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 12 Jun 07:18
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 12 Jun 07:18
comments (0)
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
(www.interpol.int)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 04:11
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 12 Jun 04:11
comments (0)
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
(www.interpol.int)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 04:10
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 04:10
comments (1)
Researchers find the first known “zero-click” attack on an AI agent; the now-fixed flaw in Microsoft 365 Copilot would let a hacker attack a user via an email
(www.aim.security)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 18:48
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 18:48
comments (1)
Researchers find the first known “zero-click” attack on an AI agent; the now-fixed flaw in Microsoft 365 Copilot would let a hacker attack a user via an email
(www.aim.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 18:48
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 18:48
comments (0)
New Secure Boot flaw lets attackers install bootkit malware, patch now
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 18:03
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 18:03
comments (1)
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:58
comments (0)
Hackers exploited Windows WebDav zero-day to drop malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:50
comments (0)
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:41
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:41
comments (1)
Salesforce Industry Cloud Hit by 20 Vulnerabilities Including 0days
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 17:24
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Jun 13:39
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Jun 13:39
comments (0)
Why would you want to sign your commits with PGP? Is SSH insufficient?
in cybersecurity@sh.itjust.works from Custodian6718@programming.dev on 11 Jun 13:23
comments (6)
in cybersecurity@sh.itjust.works from Custodian6718@programming.dev on 11 Jun 13:23
comments (6)
“Oral pleasure” app potentially leaks millions of messages and GPS locations
(cybernews.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:58
comments (2)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:58
comments (2)
“Oral pleasure” app potentially leaks millions of messages and GPS locations
(cybernews.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:58
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:58
comments (0)
New BrowserVenom malware being distributed via fake DeepSeek phishing website
(securelist.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:42
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Jun 12:42
comments (1)
New BrowserVenom malware being distributed via fake DeepSeek phishing website
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:42
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:42
comments (0)
Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:40
comments (0)
84% of Organizations’ SOC Analysts are Unknowingly Investigating the Same Incidents
(www.globenewswire.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:32
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:32
comments (2)
VU#211341 - A vulnerability in Insyde H2O UEFI application allows for digital certificate injection via NVRAM variable
(kb.cert.org)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:26
comments (0)
40,000 cameras expose feeds to datacenters, health clinics • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:18
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:18
comments (4)
Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 12:09
comments (0)
Ivanti Workspace Control hardcoded key flaws expose SQL credentials
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:58
comments (0)
Trove of port agency’s data stolen, hackers claim | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:48
comments (0)
Facebook malvertising reveals 4K domains spoofing 68 brands | SC Media
(www.scworld.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:42
comments (0)
June 2025 Patch Tuesday: Microsoft Fixes 66 Bugs, Including Active 0-Day
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:32
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Jun 11:32
comments (2)
CISO who helped unmask Badbox warns: Version 3 is coming
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Jun 08:28
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Jun 08:28
comments (0)
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage.
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 10 Jun 22:04
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 10 Jun 22:04
comments (0)
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage.
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Jun 22:03
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Jun 22:03
comments (0)
New Secure Boot flaw lets attackers install bootkit malware, patch now
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 20:59
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 20:59
comments (0)
FIN6 hackers pose as job seekers to backdoor recruiters’ devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 18:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 18:34
comments (0)
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:49
comments (0)
Critical Vulnerability Patched in SAP NetWeaver - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:42
comments (0)
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:32
comments (0)
Massive Heroku outage impacts web platforms worldwide
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:24
comments (0)
CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 17:16
comments (0)
Texas Dept. of Transportation breached, 300k crash records stolen
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:53
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:53
comments (0)
FIN6 hackers pose as job seekers to backdoor recruiters’ devices
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:36
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:36
comments (1)
New Zealand Government Mandates DMARC Under New Secure Email Framework - Security Boulevard
(securityboulevard.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:41
comments (0)
PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:34
comments (0)
Nearly 300,000 crash records stolen from Texas transportation department | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:25
comments (0)
Resecurity | APT 41: Threat Intelligence Report and Malware Analysis
(www.resecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:16
comments (0)
Cyfirma Industry Report – Energy & Utilities - Cyfirma
(www.cyfirma.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:11
comments (0)
Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability | Akamai
(www.akamai.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 12:02
comments (0)
Hidden Backdoors in npm Packages Let Attackers Wipe Entire Systems
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:58
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:58
comments (1)
Google Vulnerability Allowed Hackers to Access User Phone Numbers
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:49
comments (0)
Sensata Technologies says personal data stolen by ransomware gang
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:40
comments (0)
SentinelOne shares new details on China-linked breach attempt
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Jun 11:34
comments (0)
Chinese spy crew appears to be preparing for conflict by backdooring more than 70 critical organizations worldwide
(www.theregister.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:54
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:54
comments (0)
Chinese spy crew appears to be preparing for conflict by backdooring more than 70 critical organizations worldwide
(www.theregister.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:53
comments (4)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:53
comments (4)
Sensata Technologies says personal data stolen by ransomware gang
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:07
comments (0)
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:04
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:04
comments (1)
Is Lynis (audit tool) worth using in 2025?
in cybersecurity@sh.itjust.works from OhVenus_Baby@lemmy.ml on 09 Jun 23:57
comments (2)
in cybersecurity@sh.itjust.works from OhVenus_Baby@lemmy.ml on 09 Jun 23:57
comments (2)
US infrastructure could crumble under cyberattack, ex-NSA advisor warns
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 22:11
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 22:11
comments (5)
Grocery wholesale giant United Natural Foods hit by cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:51
comments (0)
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:42
comments (0)
BadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warns
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:35
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Jun 17:28
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Jun 17:28
comments (0)
New Salesforce SOQL Injection 0-Day Vulnerability Exposes Millions of Deployments
(cyberpress.org)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:25
comments (1)
New DuplexSpy RAT Gives Attackers Full Control Over Windows Machines
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 17:02
comments (0)
Chinese Hackers Infiltrated U.S. Telecom Networks a Year Earlier Than Previously Known
(www.apextechservices.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:42
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:42
comments (0)
Operation DRAGONCLONE: Chinese Telecom Targeted by VELETRIX & VShell Malware
(www.seqrite.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:33
comments (0)
Over 20 Malicious Apps on Google Play Target Users for Seed Phrases
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:26
comments (0)
Tax resolution firm Optima Tax Relief hit by ransomware, data leaked
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:18
comments (0)
EU Prepares for Transnational Cyberattacks - BankInfoSecurity
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 12:10
comments (0)
Malware found in NPM packages with 1 million weekly downloads
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 11:52
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Jun 11:52
comments (4)
Librarian Ghouls carry out attacks with data theft and crypto miner deployment
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 09 Jun 11:18
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 09 Jun 11:18
comments (1)
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 05:04
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 05:04
comments (0)
ChatGPT used to disable SecureBoot in locked-down device – modded BIOS reflash facilitated fresh Windows and Linux installs
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Jun 19:21
comments (10)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Jun 19:21
comments (10)
Cybercriminals turn to “residential proxy” services to hide malicious traffic
(arstechnica.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 08 Jun 12:50
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 08 Jun 12:50
comments (1)
Millions of low-cost Android devices turn home networks into crime platforms
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jun 18:20
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jun 18:20
comments (0)
Scattered Spider Uses Tech Vendor Impersonation to Target Helpdesks - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 18:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 18:08
comments (0)
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 18:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 18:00
comments (0)
Booking.com reservation abused as cybercriminals steal from travelers | Malwarebytes
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:57
comments (0)
Pro-Russia group hits Ukraine with fresh wiper malware • The Register
(www.theregister.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:49
comments (0)
Kettering Health confirms Interlock ransomware behind cyberattack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:40
comments (0)
Critical Fortinet flaws now exploited in Qilin ransomware attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:32
comments (0)
HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:11
comments (0)
New Chaos RAT Targets Linux and Windows Users to Steal Sensitive Data
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 17:02
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Jun 14:25
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Jun 14:25
comments (0)
Iranian APT 'BladedFeline' Hides in Network for 8 Years
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:35
comments (0)
U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:26
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:26
comments (1)
Proxy Services Feast on Ukraine’s IP Address Exodus – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:16
comments (0)
Nearly 94 Billion Stolen Cookies Found on Dark Web
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:10
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:10
comments (4)
PoC Exploit Released for Apache Tomcat DoS Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 13:01
comments (0)
New Zero-Click iPhone Exploit “NICKNAME” Targeted High-Profile Individuals Across the US and EU
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:57
comments (0)
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:49
comments (0)
AI-Powered Website Cloning: Same Tool Enables Automated Phishing at Scale
(www.netcraft.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:41
comments (0)
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:34
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:34
comments (1)
FBI: BADBOX 2.0 Android malware infects millions of consumer devices
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:24
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:24
comments (2)
Unsecured Database Exposes Data of 3.6 Million Passion.io Creators
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:18
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:18
comments (0)
UK tax authority reveals scammers stole £47 million | The Record from Recorded Future News
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Jun 12:10
comments (0)
Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Jun 01:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Jun 01:58
comments (1)
Home Internet Connected Devices Facilitate Criminal Activity
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 20:38
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 20:38
comments (1)
Evidence of Zero-Click iPhones Exploitation Uncovered in the U.S.
(iverify.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 17:58
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 17:58
comments (2)
More than a hundred backdoored malware repos traced to single GitHub user
(news.sophos.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Jun 16:08
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Jun 16:08
comments (1)
More than a hundred backdoored malware repos traced to single GitHub user
(news.sophos.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 16:06
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 16:06
comments (0)
Exploiting Clickfix: AMOS macOS Stealer Evades Security to Deploy Malicious Code
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 13:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 13:17
comments (0)
Vodafone Germany Fined $51 Million Over Privacy, Security Failures - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 12:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jun 12:43
comments (0)
The strange tale of ischhfd83: When cybercriminals eat their own
(news.sophos.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 12:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 12:37
comments (0)