TeleMessage, a modified Signal clone used by US government officials, has been hacked
(techcrunch.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 06 May 15:26
comments (6)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 06 May 15:26
comments (6)
Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:05
comments (0)
CISA Warns 2 SonicWall Vulnerabilities Under Active Exploitation
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 15:03
comments (0)
Italy: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national security
(decode39.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 06 May 14:33
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 06 May 14:33
comments (0)
Italy: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national security
(decode39.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 14:32
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 14:32
comments (0)
Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 May 14:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 May 14:13
comments (0)
Darcula Exposed: Inside a Global Phishing-as-a-Service Empire Powered by the Magic Cat Toolkit
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
Unauthenticated DoS Vulnerability Crashes Windows Deployment Services, No Patch
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:38
comments (2)
Google addresses 1 actively exploited vulnerability in May’s Android security update
(cyberscoop.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 13:31
comments (0)
GlobalX, Airline for Trump’s Deportations, Hacked
(archive.md)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 06 May 13:18
comments (0)
in cybersecurity@sh.itjust.works from hellfire103@lemmy.ca on 06 May 13:18
comments (0)
Gunra Ransomware – A Brief Analysis - CYFIRMA
(www.cyfirma.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:10
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:10
comments (0)
Luna Moth extortion hackers pose as IT help desks to breach US firms
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:09
comments (0)
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
Microsoft finds default Kubernetes Helm charts can expose data
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:07
comments (0)
Bring Your Own Installer: Bypassing SentinelOne Through Agent Version Change Interruption
(www.aon.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 May 12:05
comments (0)
Basic analysis of Kidflix users’ passwords – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 06 May 10:26
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 06 May 10:26
comments (0)
China has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weapons
(www.taipeitimes.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 May 09:03
comments (1)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 May 09:03
comments (1)
China has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weapons
(www.taipeitimes.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 May 09:02
comments (5)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 06 May 09:02
comments (5)
"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)
(isc.sans.edu)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 May 08:05
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 06 May 08:05
comments (0)
"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 May 08:04
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 May 08:04
comments (0)
Technical experts call on Commissioner Virkkunen for a seat on the table of the European Commission’s Technology Roadmap on encryption
(edri.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 06:23
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 06 May 06:23
comments (0)
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
PoC Published for Exploited SonicWall Vulnerabilities
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:32
comments (0)
A hacker stole data from TeleMessage, the firm that sells modified versions of Signal to the U.S. gov
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:30
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:30
comments (3)
Experts shared up-to-date C2 domains and other artifacts related to recent MintsLoader attacks
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:25
comments (0)
Germany Most Targeted Country in Q1 2025 DDoS Attacks
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 16:23
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 May 14:09
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 May 14:09
comments (1)
Malicious Go Modules designed to wipe Linux systems
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:56
comments (0)
Microsoft to Block Emails With 550 5.7.15 Access denied Error
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (2)
Hackers Selling SS7 0-Day Vulnerability on Hacker Forums for $5000
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:50
comments (1)
Windows RDP Bug Allows Login With Expired Passwords - Microsoft Confirms No Fix
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:49
comments (15)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 12:49
comments (15)
StealC malware enhanced with stealth upgrades and data theft tools
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:39
comments (0)
UK Retailers Co-op, Harrods and M&S Struggle With Cyberattacks
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 May 11:38
comments (0)
All things infostealers. Week 18, 2025 – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 05 May 06:16
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 05 May 06:16
comments (0)
Cybersecurity firm SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients
(thehackernews.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 17:33
comments (0)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 17:33
comments (0)
China is building a cyber army of hackers, report finds
(www.firstpost.com)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 12:19
comments (25)
in cybersecurity@sh.itjust.works from randomname@scribe.disroot.org on 04 May 12:19
comments (25)
How NSA Can Spy on Air-Gapped Networks? Meet FIREWALK
(www.youtube.com)
in cybersecurity@infosec.pub from kugmo@sh.itjust.works on 02 May 17:30
comments (0)
in cybersecurity@infosec.pub from kugmo@sh.itjust.works on 02 May 17:30
comments (0)
How NSA Can Spy on Air-Gapped Networks? Meet FIREWALK
(www.youtube.com)
in cybersecurity@sh.itjust.works from kugmo@sh.itjust.works on 02 May 17:25
comments (9)
in cybersecurity@sh.itjust.works from kugmo@sh.itjust.works on 02 May 17:25
comments (9)
Disney Slack hacker was Californian, not Russian
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 02 May 17:06
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 02 May 17:06
comments (0)
Why Strong Passwords Matter More Than Ever
(cryptomator.org)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 02 May 16:15
comments (3)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 02 May 16:15
comments (3)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 May 12:28
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 May 12:28
comments (4)
A Flaw With the Security Level Slider in Tor Browser
(www.privacyguides.org)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 02 May 12:17
comments (1)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 02 May 12:17
comments (1)
A Flaw With the Security Level Slider in Tor Browser
(www.privacyguides.org)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 May 12:16
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 May 12:16
comments (0)
🚨 April 2025 Vulnerability Report is out! 🚨
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 01 May 14:27
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 01 May 14:27
comments (0)
🚨 April 2025 Vulnerability Report is out! 🚨
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 14:27
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 14:27
comments (0)
Nova Scotia Power cybersecurity breach
(industrialcyber.co)
in cybersecurity@sh.itjust.works from CoolThingAboutMe@aussie.zone on 01 May 09:25
comments (0)
in cybersecurity@sh.itjust.works from CoolThingAboutMe@aussie.zone on 01 May 09:25
comments (0)
Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 06:02
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 06:02
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Apr 05:00
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Apr 05:00
comments (2)
Governments are using zero-day hacks more than ever
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 29 Apr 18:04
comments (2)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 29 Apr 18:04
comments (2)
NSA, CISA top brass absent from RSA Conference
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 Apr 21:57
comments (5)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 Apr 21:57
comments (5)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Apr 13:47
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Apr 13:47
comments (0)
A Python client for the Global CVE Allocation System.
(github.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 28 Apr 08:07
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 28 Apr 08:07
comments (0)
A Python client for the Global CVE Allocation System.
(github.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Apr 08:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Apr 08:06
comments (0)
I like my men
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 27 Apr 12:28
comments (17)
in cybersecurity@sh.itjust.works from cyrano@lemmy.dbzer0.com on 27 Apr 12:28
comments (17)
Trojanized Alpine Quest app geolocates Russian soldiers
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Apr 08:11
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 24 Apr 08:11
comments (0)
ASUS releases fix for AMI bug that lets hackers brick servers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Apr 23:54
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 23 Apr 23:54
comments (0)
Chinese hackers undertaking global infiltration campaign across 12 countries and 20 industries
(teamt5.org)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Apr 17:05
comments (1)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Apr 17:05
comments (1)
America's cyber defenses are being dismantled from the inside
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Apr 14:25
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Apr 14:25
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Apr 12:56
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Apr 12:56
comments (0)
Ripple’s recommended XRP library xrpl.js hacked to steal wallets
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 18:36
comments (1)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 18:36
comments (1)
Texas city takes systems offline after cyberattack
(therecord.media)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 22 Apr 02:52
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 22 Apr 02:52
comments (1)
Bug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 steps
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 02:48
comments (2)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 02:48
comments (2)
AI models can generate exploit code at lightning speed
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Apr 02:34
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Apr 02:34
comments (6)
Microsoft rated this bug as low exploitability. Miscreants weaponized it in just 8 days
(www.theregister.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 01:42
comments (8)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 Apr 01:42
comments (8)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Apr 13:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Apr 13:36
comments (0)
The Web is Broken
(jan.wildeboer.net)
in cybersecurity@sh.itjust.works from Ninjazzon@infosec.pub on 20 Apr 05:38
comments (0)
in cybersecurity@sh.itjust.works from Ninjazzon@infosec.pub on 20 Apr 05:38
comments (0)
What are your methods to harden *nix servers?
in cybersecurity@infosec.pub from fishynoob@infosec.pub on 19 Apr 05:42
comments (8)
in cybersecurity@infosec.pub from fishynoob@infosec.pub on 19 Apr 05:42
comments (8)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Apr 14:33
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Apr 14:33
comments (4)
How I Got Hacked: A Warning about Malicious PoCs
(chocapikk.com)
in cybersecurity@sh.itjust.works from ByteOnBikes@slrpnk.net on 18 Apr 13:31
comments (2)
in cybersecurity@sh.itjust.works from ByteOnBikes@slrpnk.net on 18 Apr 13:31
comments (2)
EUVD: Vulnerability Database operated by ENISA (beta)
(euvd.enisa.europa.eu)
in cybersecurity@sh.itjust.works from vf2000@lemmy.zip on 18 Apr 07:40
comments (2)
in cybersecurity@sh.itjust.works from vf2000@lemmy.zip on 18 Apr 07:40
comments (2)
Insecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techs
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 17 Apr 20:32
comments (0)
in cybersecurity@sh.itjust.works from recursive_recursion@lemmy.ca on 17 Apr 20:32
comments (0)
Multiple Groups Exploit NTLM Flaw in Microsoft Windows
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:06
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:06
comments (1)
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:05
comments (0)
CrazyHunter Campaign Targets Taiwanese Critical Sectors
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
New macOS Spyware PasivRobber Linked to Chinese State Actors
(cyberinsider.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:04
comments (0)
Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:03
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:03
comments (0)
Over 16,000 Fortinet devices compromised with symlink backdoor
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:02
comments (0)
CISA warns of potential data breaches caused by legacy Oracle Cloud leak
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:00
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 13:00
comments (1)
Ransomware Group Claims Hacking of Oregon Regulator After Data Breach Denial
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (0)
Huge ransomware campaign targets AWS S3 storage: attackers have thousands of keys
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Apr 12:59
comments (1)
Vulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your location
(www.youtube.com)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 20:02
comments (0)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 20:02
comments (0)
GCVE: Global CVE Allocation System
(gcve.eu)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 18:57
comments (2)
in cybersecurity@sh.itjust.works from cm0002@lemmy.world on 16 Apr 18:57
comments (2)
GCVE: Global CVE Allocation System
(gcve.eu)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 18:57
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 18:57
comments (0)
CVE program gets a last-minute save, maybe a new home
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 16 Apr 17:16
comments (1)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 16 Apr 17:16
comments (1)
ActiveX blocked by default in Microsoft 365 because remote code execution is bad, OK?
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 15:45
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 15:45
comments (2)
Researchers claim breakthrough in fight against AI’s frustrating security hole
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 15:30
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 15:30
comments (1)
Renewed Russian Phishing Campaign Against European Diplomats
(research.checkpoint.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 16 Apr 14:36
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 16 Apr 14:36
comments (0)
Renewed Russian Phishing Campaign Against European Diplomats
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 16 Apr 14:36
comments (1)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 16 Apr 14:36
comments (1)
UK Software Firm Exposed 1.1TB of Healthcare Worker Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:21
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:21
comments (0)
Windows 11 Escalation Vulnerability Let Attackers Gain Admin Access Within 300 Milliseconds
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (8)
Oracle Security Update - Patch for 378 Vulnerabilities Including Remote Exploits
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Apr 12:20
comments (1)
Cybersecurity World On Edge As CVE Program Prepares To Go Dark
(flip.it)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 06:28
comments (4)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 06:28
comments (4)
Notorious internet messageboard 4chan has been hacked, posts claim
(www.reuters.com)
in cybersecurity@sh.itjust.works from Jiggle_Physics@sh.itjust.works on 16 Apr 04:08
comments (3)
in cybersecurity@sh.itjust.works from Jiggle_Physics@sh.itjust.works on 16 Apr 04:08
comments (3)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Apr 04:08
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Apr 04:08
comments (0)
The CVE program for tracking security flaws is about to lose federal funding
(www.theverge.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 02:54
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 02:54
comments (6)
US abruptly turns off funding for CVE program
(www.theregister.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 02:29
comments (28)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 16 Apr 02:29
comments (28)
MITRE funding for the Common Vulnerabilities and Exposures (CVE) program will expire on April 16th
(infosec.exchange)
in cybersecurity@infosec.pub from CyberSeeker@discuss.tchncs.de on 15 Apr 22:50
comments (1)
in cybersecurity@infosec.pub from CyberSeeker@discuss.tchncs.de on 15 Apr 22:50
comments (1)
Landmark Admin now says info on 1.6M people stolen from it
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Apr 22:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Apr 22:12
comments (0)
The CVE program for tracking security flaws is about to lose federal funding
(www.theverge.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 15 Apr 20:49
comments (6)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 15 Apr 20:49
comments (6)
Threat actors misuse Node.js to deliver malware and other malicious payloads
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Apr 20:45
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Apr 20:45
comments (1)
Threat actors misuse Node.js to deliver malware and other malicious payloads
(www.microsoft.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Apr 20:45
comments (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 15 Apr 20:45
comments (0)
Renewed APT29 Phishing Campaign Against European Diplomats - Check Point Research
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:41
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:41
comments (0)
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:14
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:14
comments (2)
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:13
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 19:13
comments (0)
4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War
(www.404media.co)
in cybersecurity@infosec.pub from Deebster@infosec.pub on 15 Apr 17:50
comments (11)
in cybersecurity@infosec.pub from Deebster@infosec.pub on 15 Apr 17:50
comments (11)
Google adds Android auto-reboot to block forensic data extractions
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:30
comments (0)
Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
Possible Russian Hackers Targeted UK Ministry of Defense
(www.bankinfosecurity.in)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:28
comments (0)
Hackers Leveraging Teams Messages to Execute Malware on Windows Systems
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (1)
New Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defenses
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
Over 100,000 WordPress Plugin VUlnerability Exploited Just 4 Hours After Disclosure
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:25
comments (0)
Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:23
comments (0)
Hertz data breach: Customers in US, EU, UK, Australia and Canada affected - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Apr 17:22
comments (0)
4Chan hacked
(www.the-sun.com)
in cybersecurity@sh.itjust.works from Picasso@sh.itjust.works on 15 Apr 13:04
comments (5)
in cybersecurity@sh.itjust.works from Picasso@sh.itjust.works on 15 Apr 13:04
comments (5)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Apr 12:38
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Apr 12:38
comments (0)
South African telecom provider Cell C disclosed a data breach
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:22
comments (0)
SSL Certificate Validity Reduced to 47 Days After Apple Proposal
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (10)
Chrome 136 fixes 20-year browser history privacy risk
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:21
comments (2)
Data Breach at Planned Parenthood Lab Partner Exposes Info of 1.6M
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 12:20
comments (0)
China Admitted to Volt Typhoon Cyberattacks on US Critical Infrastructure: Report
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
TROX Stealer: A deep dive into a new Malware as a Service (MaaS) attack campaign
(sublime.security)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:47
comments (0)
GoPhish Infrastructure Targets Polish Energy and Government
(hunt.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:46
comments (0)
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
Russia’s Storm-2372 Hits Orgs with MFA Bypass via Device Code Phishing
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
Wolters Kluwer allegedly hit by data breach, threatening Fortune 500 firms
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Apr 11:44
comments (0)
In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks
(www.wsj.com)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 14 Apr 04:25
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 14 Apr 04:25
comments (0)
Hacktivism is back – but don't be fooled, it's often state-backed goons in masks
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 13 Apr 21:29
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 13 Apr 21:29
comments (0)
AI-hallucinated code dependencies become new supply chain risk
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:55
comments (3)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:55
comments (3)
Microsoft: Windows 'inetpub' folder created by security fix, don’t delete
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:50
comments (22)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:50
comments (22)
Microsoft Defender will isolate undiscovered endpoints to block attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:48
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 12 Apr 21:48
comments (0)
Initial Access Brokers Shift Tactics, Selling More for Less
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:33
comments (0)
CVE-2025-29824 Vulnerability: Exploitation of a Windows CLFS Zero-Day Could Trigger Ransomware Attacks - SOC Prime
(socprime.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (0)
U.S. CISA adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:32
comments (4)
Sensata Technologies Breached: Ransomware Attack Key Systems
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
Jenkins Docker Images Vulnerable to SSH Host Key Reuse
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:30
comments (0)
Ransomware attack cost IKEA operator in Eastern Europe $23 million
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
Ransomware groups push negotiations to new levels of uncertainty - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:28
comments (0)
Ransomware groups push negotiations to new levels of uncertainty - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
Hackers exploit WordPress plugin auth bypass hours after disclosure
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
FortiSwitch vulnerability may give attackers control over vulnerable devices (CVE-2024-48887) - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:27
comments (0)
Incomplete NVIDIA Patch to CVE-2024-0132 Exposes AI Infrastructure and Data to Critical Risks
(www.trendmicro.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
Newly Registered Domains Distributing SpyNote Malware - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
Resecurity | Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach
(www.resecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:25
comments (0)
AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
(www.sentinelone.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (0)
Phishing kits now vet victims in real-time before stealing credentials
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 13:23
comments (1)
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 12:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Apr 12:37
comments (0)
AMD confirms security vulnerability in every Zen 1 to Zen 5 processor
(www.tweaktown.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Apr 06:12
comments (10)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Apr 06:12
comments (10)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Apr 04:12
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Apr 04:12
comments (0)
China-based SMS Phishing Triad Pivots to Banks
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Apr 02:21
comments (0)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 11 Apr 02:21
comments (0)
Oracle Appears to Admit Breach of 2 'Obsolete' Servers
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:55
comments (0)
Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:54
comments (0)
Google fixes two actively exploited zero-day vulnerabilities in Android
(www.malwarebytes.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:48
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:48
comments (1)
CISA Warns of CentreStack's Hard-Coded MachineKey Vulnerability Enabling RCE Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:47
comments (0)
Hackers Claim Magento Breach via Third-Party, Leak CRM Data of 700K Users
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
Hacker Claims WooCommerce Data Breach, Selling 4m User Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (0)
17,000,000 GrubHub passwords and other data exposed, hackers claim
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (8)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Apr 11:46
comments (8)
Ransomware Attacks Hit All-Time High as Payoffs Dwindle
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 20:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 20:38
comments (0)
Microsoft April 2025 Patch Tuesday - SANS Internet Storm Center
(isc.sans.edu)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
WhatsApp flaw can let attackers run malicious code on Windows PCs
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:47
comments (0)
Fastly DDoS Attack Insights helps reveal and explain the unfolding of a DDoS attack - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:46
comments (0)
Hackers lurked in Treasury OCC’s systems since June 2023 breach
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
300K vehicles and millions of trips exposed in fleet manager’s data leak
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:38
comments (0)
CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
New Mirai botnet behind surge in TVT DVR exploitation
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:37
comments (0)
Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:36
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Apr 11:36
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Apr 04:01
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Apr 04:01
comments (4)
Pharmacist accused of spying on women using work, home cams
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 09 Apr 03:23
comments (3)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 09 Apr 03:23
comments (3)
Google fixes two Android zero-day bugs actively exploited by hackers
(techcrunch.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Apr 02:53
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Apr 02:53
comments (0)
Food giant WK Kellogg discloses data breach linked to Clop ransomware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:53
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:53
comments (0)
ToddyCat APT Targets ESET Bug to Load Silent Malware
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:52
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:52
comments (0)
Cybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platforms
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:50
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:50
comments (0)
Google fixes Android zero-days exploited in attacks, 60 other flaws
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (1)
Everest ransomware's dark web leak site defaced, now offline
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Apr 11:47
comments (0)
CISA braces for more cuts, threat-intel efforts are doomed
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 02:12
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 02:12
comments (0)
Oracle tells customers its public cloud was compromised
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 01:21
comments (3)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 08 Apr 01:21
comments (3)
Malicious VSCode extensions infect Windows with cryptominers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from drspod@lemmy.ml on 07 Apr 17:56
comments (2)
in cybersecurity@sh.itjust.works from drspod@lemmy.ml on 07 Apr 17:56
comments (2)
How curl developers write safe(r) code in C
(www.youtube.com)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 07 Apr 16:12
comments (0)
in cybersecurity@sh.itjust.works from boredsquirrel@slrpnk.net on 07 Apr 16:12
comments (0)
E-ZPass toll payment texts return in massive phishing wave
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:30
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:30
comments (2)
Python JSON Logger Vulnerability Enables Remote Code Execution - PoC Released
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (0)
New Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoader
(securityonline.info)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Apr 14:29
comments (1)
How ToddyCat tried to hide behind AV software.
(securelist.com)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 07 Apr 14:25
comments (0)
in cybersecurity@sh.itjust.works from Tea@programming.dev on 07 Apr 14:25
comments (0)
How ToddyCat tried to hide behind AV software.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 07 Apr 14:25
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 07 Apr 14:25
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Apr 13:27
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Apr 13:27
comments (0)
WinRAR security flaw ignores Windows Mark of the Web security warnings
(www.tomshardware.com)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 07 Apr 05:21
comments (20)
in cybersecurity@sh.itjust.works from Alphane_Moon@lemmy.world on 07 Apr 05:21
comments (20)
Why OAuth MUST share access token with 3rd party?!?
in cybersecurity@infosec.pub from maltfield@lemmy.ca on 06 Apr 2025 01:43
comments (2)
in cybersecurity@infosec.pub from maltfield@lemmy.ca on 06 Apr 2025 01:43
comments (2)
Why OAuth MUST share access token with 3rd party?!?
in cybersecurity@sh.itjust.works from maltfield@monero.town on 06 Apr 2025 00:56
comments (16)
in cybersecurity@sh.itjust.works from maltfield@monero.town on 06 Apr 2025 00:56
comments (16)
Cyberattacks by AI agents are coming
(www.technologyreview.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 05 Apr 2025 16:35
comments (9)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 05 Apr 2025 16:35
comments (9)
Port of Seattle says ransomware breach impacts 90,000 people
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 18:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 18:49
comments (0)
PoisonSeed Campaign Targets CRM and Bulk Email Providers in Supply Chain Spam Operation
(www.silentpush.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 18:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 18:48
comments (0)
Malicious VPN Extensions on Chrome Web Store Infect 139,000 Users
(cyberinsider.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 04 Apr 2025 18:40
comments (0)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 04 Apr 2025 18:40
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Apr 2025 13:16
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Apr 2025 13:16
comments (2)
RolandSkimmer: Silent Credit Card Thief Uncovered | FortiGuard Labs
(www.fortinet.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 11:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 11:44
comments (0)
Hackers strike Australia's largest pension funds in coordinated attacks
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 11:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Apr 2025 11:43
comments (0)
Simplifying JWT Validation for Developers
in cybersecurity@infosec.pub from andyssojet@sh.itjust.works on 04 Apr 2025 09:53
comments (1)
in cybersecurity@infosec.pub from andyssojet@sh.itjust.works on 04 Apr 2025 09:53
comments (1)
Simplifying JWT Validation for Developers
in cybersecurity@sh.itjust.works from andyssojet@sh.itjust.works on 04 Apr 2025 09:31
comments (1)
in cybersecurity@sh.itjust.works from andyssojet@sh.itjust.works on 04 Apr 2025 09:31
comments (1)
New approach.
in cybersecurity@sh.itjust.works from opalfrost@friendica.world on 03 Apr 2025 15:40
comments (0)
in cybersecurity@sh.itjust.works from opalfrost@friendica.world on 03 Apr 2025 15:40
comments (0)
Apple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)
(arstechnica.com)
in cybersecurity@sh.itjust.works from onlinepersona@programming.dev on 04 Apr 2025 07:10
comments (1)
in cybersecurity@sh.itjust.works from onlinepersona@programming.dev on 04 Apr 2025 07:10
comments (1)
Suspected Chinese snoops hijacking buggy Ivanti gear — again
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 03 Apr 2025 20:02
comments (0)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 03 Apr 2025 20:02
comments (0)
Hacker Claims Twilio's SendGrid Data Breach, Selling 848,000 Records
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Apr 2025 19:18
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Apr 2025 19:18
comments (2)
Recent GitHub supply chain attack traced to leaked SpotBugs token
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Apr 2025 19:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Apr 2025 19:16
comments (0)