home groups about login help
Vulnerability Report - August 2025 (discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Sep 14:06
comments (0)
Modern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attacks (cyberinsider.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 22:00
comments (13)
France says Apple notified victims of new spyware attacks
in cybersecurity@sh.itjust.works from Pro@programming.dev on 11 Sep 21:59
comments (0)
European crypto platform SwissBorg to reimburse users after $41 million theft (therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:38
comments (0)
DDoS Mitigation Provider targeted In 1.5 Gpps 1.5 Billion Packets per Second DDoS Attack (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:30
comments (0)
Jaguar Land Rover confirms data theft after recent cyberattack (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:18
comments (0)
Malicious npm Code Reached 10% of Cloud Environments (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 17:05
comments (1)
China pilots village surveillance in Solomon Islands in the Pacific, where Chinese police are collecting fingerprints, palm prints to "curb social unrest" (www.reuters.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Sep 16:31
comments (0)
China pilots village surveillance in Solomon Islands in the Pacific, where Chinese police are collecting fingerprints, palm prints to "curb social unrest" (www.reuters.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 11 Sep 16:30
comments (2)
Nokia CEO calls on EU to remove “high-risk vendors” - specifically China's Huawei and ZTE - from European networks (coincentral.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (0)
Nokia CEO calls on EU to remove “high-risk vendors” - specifically China's Huawei and ZTE - from European networks (coincentral.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 11 Sep 14:57
comments (12)
US Senator Wyden pushes FTC to investigate Microsoft for 'gross cybersecurity negligence' (www.reuters.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 10 Sep 21:48
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Sep 16:13
comments (1)
A look at a P2P camera (LookCam app) (palant.info)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Sep 14:22
comments (0)
Apple: iPhone 17 lineup and iPhone Air come with Memory Integrity Enforcement, which provides always-on memory safety protection (security.apple.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 10 Sep 13:52
comments (4)
Surge in networks scans targeting Cisco ASA devices raise concerns (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:48
comments (0)
45 New Domains Linked to Salt Typhoon, UNC4841 (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:40
comments (0)
Georgia Hospital Notifying 163,000 of 2024 Ransomware Hack (www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Sep 18:22
comments (0)
npm debug and chalk packages compromised (www.aikido.dev)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Sep 17:47
comments (0)
Plex Media Server: Important Notice of Security Incident (forums.plex.tv)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 12:37
comments (0)
Graphite, the Israeli spyware acquired by ICE (english.elpais.com)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 08:03
comments (1)
Graphite, the Israeli spyware acquired by ICE (english.elpais.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 08:03
comments (3)
Ex-WhatsApp cybersecurity head says Meta endangered billions of users in new suit (www.theguardian.com)
in cybersecurity@sh.itjust.works from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
Ex-WhatsApp cybersecurity head says Meta endangered billions of users in new suit (www.theguardian.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 07:10
comments (0)
Largest NPM Compromise in History(Packages With Over 2.6 Billion Total Weekly Downloads) - Supply Chain Attack (www.aikido.dev)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:56
comments (0)
LookCam App Users Exposed to Critical Security Risks (palant.info)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 09 Sep 01:55
comments (0)
18 Popular Code Packages Hacked, Rigged to Steal Crypto – Krebs on Security (krebsonsecurity.com)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 00:44
comments (0)
Czech cyber agency flags Chinese espionage risks to critical infrastructure (securityaffairs.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
Czech cyber agency flags Chinese espionage risks to critical infrastructure (securityaffairs.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 08 Sep 13:32
comments (0)
Double trouble with CastleRAT malware, now in C and Python (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Sep 17:26
comments (0)
We Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillance (bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 Sep 14:24
comments (1)
ImaginaryCTF 2025 | September 5-7, 12 PM PDT | a cybersecurity CTF competition with a variety of challenges for all skill levels (2025.imaginaryctf.org)
in cybersecurity@infosec.pub from otter@lemmy.ca on 05 Sep 20:28
comments (0)
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages (thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 05 Sep 20:10
comments (2)
Sextortion with a twist: Spyware takes webcam pics of users watching porn (arstechnica.com)
in cybersecurity@sh.itjust.works from return2ozma@lemmy.world on 05 Sep 18:47
comments (9)
Chess.com confirms data breach (www.neowin.net)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 18:35
comments (9)
Zero-day vulnerability discovered in TP-Link routers (www.techzine.eu)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 05 Sep 15:03
comments (7)
China-aligned crew poisons Windows servers to manipulate Google results (www.welivesecurity.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 05 Sep 10:55
comments (2)
Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 05 Sep 05:42
comments (0)
The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest. (arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Sep 23:54
comments (3)
AI hacking. Downloading images can allow your computer to be hijacked
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 04 Sep 20:50
comments (3)
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling (thehackernews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 17:35
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 14:10
comments (1)
My Pixel 10 warned me 8 times in 30-minutes that there was a rogue connection made. Deeply concerning
in cybersecurity@sh.itjust.works from Jerry@feddit.online on 02 Sep 00:26
comments (64)
[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method (www.usenix.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 19:47
comments (0)
DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally (www.netscout.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 01 Sep 16:43
comments (0)
Pizza Intelligence - How Pentagon pizza orders correlate with big news (pizzint.watch)
in cybersecurity@sh.itjust.works from RagnarokOnline@programming.dev on 30 Aug 15:13
comments (7)
DHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access Federal Emergency Management Agency (FEMA) networks (www.dhs.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 30 Aug 12:34
comments (10)
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials (thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 20:05
comments (0)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware (techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware (techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:48
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies (techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 19:45
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies (techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 29 Aug 19:46
comments (0)
Cybersecurity News Review - Week 35 (2025) (cybernewsweekly.substack.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 18:47
comments (0)
New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 14:34
comments (2)
Two New feeds from CERT-FR integrated in Vulnerability-Lookup (discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 13:47
comments (0)
I Hacked BellaBot and Every Robot from China's Biggest Robotics Company (Pudu Only Fixed It When I Told Their Clients) (bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 29 Aug 13:29
comments (0)
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies (thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:07
comments (1)
Netherlands Confirms China’s Salt Typhoon Hacking Group Targeted Small Dutch Telcos (www.infosecurity-magazine.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
Netherlands Confirms China’s Salt Typhoon Hacking Group Targeted Small Dutch Telcos (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 29 Aug 13:06
comments (0)
Google is getting ready to 'hack back' as US considers shifting from cyber defense to offense — new 'Scam Farms' bill opens up new retaliatory hacking actions (www.tomshardware.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 29 Aug 13:02
comments (0)
Catch-22: Uncovering Compromised Hosts using SSH Public Keys | USENIX (www.usenix.org)
in cybersecurity@infosec.pub from jstangroome@infosec.pub on 29 Aug 00:30
comments (0)
The FBI and agencies in the UK, Canada, and others warn that a Chinese hacking campaign targeting US telecoms has expanded to more countries and US companies (www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 28 Aug 08:52
comments (0)
UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks (www.ncsc.gov.uk)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks (www.ncsc.gov.uk)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 Aug 05:06
comments (0)
Russia-based Yandex employee oversees open-source software approved for Department of Defense use (huntedlabs.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 18:16
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Aug 14:56
comments (2)
Malicious versions of Nx and some supporting plugins were published (github.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:20
comments (0)
Anthropic: Claude was weaponized for sophisticated cybercrimes, including a “vibe-hacking” data extortion scheme (www.anthropic.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 Aug 13:03
comments (0)
The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says (www.nytimes.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 27 Aug 08:15
comments (1)
The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says (www.nytimes.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 27 Aug 08:14
comments (0)
ESET Research: The first AI-powered(LLM) ransomware has been discovered- PromptLock.
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 21:12
comments (7)
Malware-ridden apps made it into Google's Play Store, scored 19 million downloads (www.theregister.com)
in cybersecurity@sh.itjust.works from nemeski@mander.xyz on 26 Aug 13:27
comments (5)
Cyberattack on state systems bring Nevada’s official websites & phone lines down; officials rely on social media to issue updates
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:23
comments (0)
Chinese Hackers Hijack Web Traffic to Spy on Foreign Diplomats (cloud.google.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 26 Aug 12:22
comments (0)
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations (thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 26 Aug 10:48
comments (0)
Vulnerability-Lookup 2.15.0 released (discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 14:07
comments (0)
BCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourg (discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 14:06
comments (0)
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot (thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 25 Aug 13:42
comments (0)
ghrc.io Appears to be Malicious (bmitch.net)
in cybersecurity@sh.itjust.works from sith@lemmy.zip on 25 Aug 03:31
comments (0)
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection (thehackernews.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 24 Aug 21:53
comments (4)
Can you recommend a book that teaches you about cybersecurity?
in cybersecurity@sh.itjust.works from kennedy@lemmy.dbzer0.com on 24 Aug 14:50
comments (12)
I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doors (bobdahacker.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Aug 20:35
comments (12)
I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doors (bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 23 Aug 20:35
comments (29)
Data I/O ransomware attack ‘temporarily impacted’ operations (www.theregister.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 23 Aug 05:15
comments (0)
GrapheneOS: Another contributor attacked & banned by Daniel Micay (tech.michaelaltfield.net)
in cybersecurity@sh.itjust.works from maltfield@monero.town on 19 Aug 16:37
comments (0)
Hackers access data of 850,000 Orange Belgium customers (www.euractiv.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
Hackers access data of 850,000 Orange Belgium customers (www.euractiv.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 22 Aug 11:42
comments (0)
Colt Confirms Customer Data Stolen in Ransomware Attack (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Aug 11:11
comments (0)
Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To China (citizenlab.ca)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (0)
How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) | bobdahacker (bobdahacker.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 20 Aug 15:20
comments (6)
[Meta] Can you allow the English language posts?
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Aug 14:49
comments (1)
Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure (www.ic3.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 14:43
comments (0)
UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity risks (www.artificialintelligence-news.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:26
comments (0)
UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity risks (www.artificialintelligence-news.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:25
comments (2)
Zero-Day Vulnerability allow attackers to steal users data Found in Password Managers( 1Password, Bitwarden, LastPass, Enpass, iCloud Passwords, and LogMeOnce remain unpatched— still vulnerable) (marektoth.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 Aug 10:01
comments (8)
Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To China (citizenlab.ca)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 10:13
comments (1)
How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) (bobdahacker.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 18:52
comments (0)
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories (research.kudelskisecurity.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 16:54
comments (2)
Intel Outside: Hacking every Intel employee and various internal websites (eaton-works.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 13:56
comments (1)
Intel Outside: Hacking every Intel employee and various internal websites (eaton-works.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 19 Aug 07:31
comments (0)
Cyber attack exposes details of more than 200,000 iinet customers (www.abc.net.au)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 19 Aug 07:00
comments (0)
Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Tools (cybersrcc.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (0)
Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Tools (cybersrcc.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 Aug 06:04
comments (1)
Google's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdot (yro.slashdot.org)
in cybersecurity@infosec.pub from cm0002@piefed.world on 18 Aug 14:12
comments (1)
Researcher to release exploit for full auth bypass on FortiWeb (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 17 Aug 23:48
comments (0)
Citizen Lab director warns Black Hat security conference about authoritarian descent (techcrunch.com)
in cybersecurity@sh.itjust.works from Davriellelouna@lemmy.world on 17 Aug 10:33
comments (0)
Citizen Lab director warns Black Hat security conference about authoritarian descent (techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 17 Aug 10:31
comments (0)
LLM chatbots trivial to weaponize for data theft, say boffins (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 17:34
comments (0)
SoupDealer Malware Bypasses Every Sandbox, AV's and EDR/XDR in Real-World Incidents (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 00:26
comments (8)
MadeYouReset: Turning HTTP/2 Server Against Itself | Imperva (www.imperva.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 15 Aug 13:55
comments (0)
For $40, you can buy stolen police and government email accounts (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 14 Aug 21:13
comments (5)
Malvertising campaign leads to PS1Bot, a multi-stage malware framework (blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 14:02
comments (0)
Data leak could cut electricity to Mexico | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:34
comments (0)
Pennsylvania attorney general's email, site down after cyberattack (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:25
comments (0)
Major HTTP flaw puts 24 million websites at risk​ | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:18
comments (9)
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:09
comments (0)
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 12:00
comments (0)
Microsoft fixes "BadSuccessor" Kerberos vulnerability (CVE-2025-53779) - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Aug 11:57
comments (0)
Hackers Raid Dutch Lab, Stealing Data on 500,000 Patients - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:34
comments (0)
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:25
comments (2)
Home Office Phishing Scam Targets UK Immigration Sponsors - Infosecurity Magazine (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:17
comments (0)
Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2025 14:10
comments (1)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition (vreme.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 13 Aug 2025 13:02
comments (0)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition (vreme.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 13 Aug 2025 13:02
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks (www.aspistrategist.org.au)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 04:51
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks (www.aspistrategist.org.au)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 04:51
comments (0)
Russia Is Suspected to Be Behind Breach of Federal Court Filing System (archive.ph)
in cybersecurity@sh.itjust.works from sundray@lemmus.org on 12 Aug 2025 23:10
comments (0)
Docker Hub still hosts dozens of Linux images with the XZ backdoor (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Aug 2025 19:14
comments (1)
Saint Paul cyberattack linked to Interlock ransomware gang (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 17:02
comments (0)
Scattered Spider and ShinyHunters' Next Move: Leaking Data (www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 16:58
comments (0)
ShinyHunters Unveils That BreachForums Taken by Law Enforcement Agencies, Now It Is a Honeypot (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 12 Aug 2025 16:56
comments (1)
New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises | Trend Micro (US) (www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 16:48
comments (0)
Adult sites trick users into Liking Facebook posts using a clickjack Trojan (www.malwarebytes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Aug 2025 13:58
comments (0)
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:41
comments (0)
Flaws in Major Automaker's Dealership Systems Allowed Car Hacking, Personal Data Theft - SecurityWeek (www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:32
comments (0)
Over 29,000 Exchange servers unpatched against high-severity flaw (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:25
comments (0)
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:16
comments (0)
Hackers steal Google Ads business contact data | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Aug 2025 12:09
comments (0)
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity (www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 12 Aug 2025 04:55
comments (3)
MuddyWater’s DarkBit ransomware cracked for free data recovery (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 18:26
comments (0)
Connex Credit Union data breach impacts 172,000 members (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 18:14
comments (0)
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 14:44
comments (6)
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscaler, and NetSkope (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 14:30
comments (0)
Data Dump From APT Actor Yields Clues to Attacker Capabilities (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:34
comments (0)
Ransomware Attacks Fall by Almost Half in Q2 (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:26
comments (0)
Google Calendar invites let researchers hijack Gemini to leak user data (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:17
comments (2)
U.S. Judiciary confirms breach of court electronic records service (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:09
comments (0)
Cancer care provider breach exposes 113K+ patients​ | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 12:01
comments (0)
GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:56
comments (0)
15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652) (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:48
comments (1)
Boeing, US Navy supplier Jamco Aerospace claimed in ransomware attack | Cybernews (cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:42
comments (1)
WinRAR zero-day exploited to plant malware on archive extraction (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:33
comments (2)
Australian Regulator Sues Optus Over 2022 Data Breach (www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Aug 2025 11:12
comments (0)
The inside story of the Telemessage saga, and how you can view the data (www.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@piefed.social on 10 Aug 2025 22:16
comments (0)
BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 09 Aug 2025 23:08
comments (4)
Flipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 02:32
comments (27)
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges (cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 02:21
comments (20)
Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds (www.wired.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 09 Aug 2025 00:08
comments (27)
Is it fine if a website says "email already in use" before you hit submit?
in cybersecurity@sh.itjust.works from Jankatarch@lemmy.world on 08 Aug 2025 22:14
comments (42)
DEFCON Twitch Streams are live (dctv.defcon.org)
in cybersecurity@infosec.pub from scytale@piefed.zip on 08 Aug 2025 17:42
comments (0)
Security Researchers found a way to trick Windows Hello authentication, but there is a simple fix - gHacks Tech News (www.ghacks.net)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 08 Aug 2025 15:57
comments (1)
Oops Safari, I think You Spilled Something! (blog.exodusintel.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Aug 2025 09:53
comments (0)
Cyber Resilience Corps - Protecting America's Communities Together (www.cybervolunteers.us)
in cybersecurity@infosec.pub from ryokimball@infosec.pub on 08 Aug 2025 00:42
comments (0)
HTTP/1.1 Must Die: What This Means for AppSec Leadership (portswigger.net)
in cybersecurity@infosec.pub from cron@feddit.org on 07 Aug 2025 21:31
comments (1)
GenAI Used to Impersonate Brazil’s Govt Websites | ThreatLabz (www.zscaler.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:24
comments (0)
Shared secret: EDR killer in the kill chain – Sophos News (news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:17
comments (0)
Makop Ransomware Identified in Attacks in South Korea - ASEC (asec.ahnlab.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:10
comments (0)
Google suffers data breach in ongoing Salesforce data theft attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 14:01
comments (0)
KLM Confirms Customer Data Breach Linked to Third-Party System (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 13:57
comments (1)
Ukraine claims to have hacked secrets from Russia's newest nuclear submarine (www.bitdefender.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Aug 2025 13:50
comments (0)
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault (cyata.ai)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Aug 2025 09:01
comments (0)
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Aug 2025 03:18
comments (0)
Gov+ (www.bbb.org)
in cybersecurity@sh.itjust.works from griff@lemmings.world on 06 Aug 2025 18:34
comments (4)
Google suffers data breach in ongoing Salesforce data theft attacks (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 17:45
comments (0)
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released (www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 17:44
comments (0)
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks (cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 16:23
comments (0)
Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender (gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 14:49
comments (0)
ReVault! When your SoC turns against you… (blog.talosintelligence.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Aug 2025 14:16
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Aug 2025 13:58
comments (0)
Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto | SentinelOne (www.sentinelone.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 13:08
comments (0)
Rapid Breach: Social Engineering to Remote Access in 300 Seconds | NCC Group (www.nccgroup.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 13:00
comments (0)
Cybersecurity Services, Solutions & Products. Global Provider | Group-IB (www.group-ib.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:56
comments (0)
Pandora confirms data breach amid ongoing Salesforce data theft attacks (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:49
comments (1)
PBS confirms data breach after employee info leaked on Discord servers (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:40
comments (2)
Cisco User Data Stolen in Vishing Attack (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2025 12:33
comments (4)
Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistance (www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Aug 2025 08:59
comments (2)
ClickTok: The SparkKitty Drop on TikTok Shops (www.ctm360.com)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 17:13
comments (0)
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape (socket.dev)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 13:01
comments (0)
Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives (blog.cloudflare.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:58
comments (6)
LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code (hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:50
comments (6)
Ransomware groups shift to quadruple extortion to maximize pressure - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:42
comments (0)
Nvidia Patches Critical RCE Vulnerability Chain (www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2025 12:35
comments (0)
Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integrity (cispa.de)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 09:14
comments (0)
Ransomware gangs join attacks targeting Microsoft SharePoint servers (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 17:38
comments (0)
From Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy - DomainTools Investigations | DTI (dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 17:29
comments (1)
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft (thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 16:55
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Aug 2025 14:21
comments (0)
Attackers exploit link-wrapping services to steal Microsoft 365 logins (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:25
comments (0)
Pi-hole discloses data breach triggered by WordPress plugin flaw (www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:16
comments (1)
Average global data breach cost now $4.44 million - Help Net Security (www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Aug 2025 12:09
comments (0)