Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 hour agoNorth Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkNorth Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacksplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoHackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltrationplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltrationplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 hours agoApple espionage on its employees iPhones and iCloud accountsplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square2fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkApple espionage on its employees iPhones and iCloud accountsplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 hours agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoThe shocking speed of AWS key exploitation - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkThe shocking speed of AWS key exploitation - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoSalesforce Applications Vulnerability Could Allow Full Account Takeoverplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkSalesforce Applications Vulnerability Could Allow Full Account Takeoverplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoUK Ministry of Defense MoD passwords leaked on Dark Web - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkUK Ministry of Defense MoD passwords leaked on Dark Web - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoCisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Softwareplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkCisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Softwareplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoKorea arrests CEO for adding DDoS feature to satellite receiversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkKorea arrests CEO for adding DDoS feature to satellite receiversplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoMicrosoft Boosts Device Security With Windows Resiliency Initiativeplus-squarewww.darkreading.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Boosts Device Security With Windows Resiliency Initiativeplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day ago8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Playplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Playplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoApple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wildplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wildplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNew Windows Server 2012 zero-day gets free, unofficial patchesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Windows Server 2012 zero-day gets free, unofficial patchesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNovel phising campaign uses corrupted Word documents to evade securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNovel phising campaign uses corrupted Word documents to evade securityplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoZabbix urges upgrades after SQL injection bug disclosure • The Registerplus-squarego.theregister.comexternal-linkmessage-square3fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZabbix urges upgrades after SQL injection bug disclosure • The Registerplus-squarego.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square3fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoPhishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacksplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoRansomware spreading through Microsoft Teams - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRansomware spreading through Microsoft Teams - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoMimic Ransomware: What You Need To Knowplus-squarewww.tripwire.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMimic Ransomware: What You Need To Knowplus-squarewww.tripwire.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoResearchers Detailed New Exfiltration Techniques Used By Ransomware Groupsgbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers Detailed New Exfiltration Techniques Used By Ransomware Groupsgbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoSMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropboxgbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropboxgbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoZello asks users to reset passwords after security incidentplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZello asks users to reset passwords after security incidentplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink