Kid@sh.itjust.worksMEnglish · 13 hours agoNovel phising campaign uses corrupted Word documents to evade securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNovel phising campaign uses corrupted Word documents to evade securityplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 10 hours agoMicrosoft Boosts Device Security With Windows Resiliency Initiativeplus-squarewww.darkreading.comexternal-linkmessage-square1fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkMicrosoft Boosts Device Security With Windows Resiliency Initiativeplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 10 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoNew Windows Server 2012 zero-day gets free, unofficial patchesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Windows Server 2012 zero-day gets free, unofficial patchesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 13 hours ago8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Playplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-link8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Playplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoApple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wildplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkApple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wildplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoZabbix urges upgrades after SQL injection bug disclosure • The Registerplus-squarego.theregister.comexternal-linkmessage-square3fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZabbix urges upgrades after SQL injection bug disclosure • The Registerplus-squarego.theregister.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square3fedilink
taaz@biglemmowski.winEnglish · edit-23 days agoLab401 black friday / cyber monday sale with hamster huntplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareLab401 black friday / cyber monday sale with hamster huntplus-squaretaaz@biglemmowski.winEnglish · edit-23 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoPhishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoRansomware spreading through Microsoft Teams - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRansomware spreading through Microsoft Teams - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoMimic Ransomware: What You Need To Knowplus-squarewww.tripwire.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMimic Ransomware: What You Need To Knowplus-squarewww.tripwire.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoResearchers Detailed New Exfiltration Techniques Used By Ransomware Groupsgbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers Detailed New Exfiltration Techniques Used By Ransomware Groupsgbhackers.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoSMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropboxplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropboxplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoZello asks users to reset passwords after security incidentplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZello asks users to reset passwords after security incidentplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoAttack Group APT-C-60 Targets Japan Using Trusted Platformsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttack Group APT-C-60 Targets Japan Using Trusted Platformsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoPro-Russian Hacktivists Launch Branded Ransomware Operationsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPro-Russian Hacktivists Launch Branded Ransomware Operationsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-25 days agoHackers abuse popular Godot game engine to infect thousands of PCsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers abuse popular Godot game engine to infect thousands of PCsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-25 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-25 days agoCloudflare says it lost 55% of logs pushed to customers for 3.5 hoursplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCloudflare says it lost 55% of logs pushed to customers for 3.5 hoursplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-25 days agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 5 days agoSalt Typhoon’s cyberstorm reaches beyond US telcosplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSalt Typhoon’s cyberstorm reaches beyond US telcosplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoResearchers Discover "Bootkitty" – First UEFI Bootkit Targeting Linux Kernelsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers Discover "Bootkitty" – First UEFI Bootkit Targeting Linux Kernelsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 5 days agoData broker leaves 600K+ sensitive files exposed onlineplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkData broker leaves 600K+ sensitive files exposed onlineplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 5 days agomessage-square0fedilink