Kid@sh.itjust.worksMEnglish · 11 hours agoGoogle fixes Android zero-days exploited in attacks, 60 other flawsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkGoogle fixes Android zero-days exploited in attacks, 60 other flawsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square1fedilink
PhilipTheBucket@ponder.catEnglish · 21 hours agoOracle tells customers its public cloud was compromisedplus-squarego.theregister.comexternal-linkmessage-square3fedilinkarrow-up194arrow-down10
arrow-up194arrow-down1external-linkOracle tells customers its public cloud was compromisedplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 21 hours agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoFood giant WK Kellogg discloses data breach linked to Clop ransomwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkFood giant WK Kellogg discloses data breach linked to Clop ransomwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoCybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platformsplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platformsplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoToddyCat APT Targets ESET Bug to Load Silent Malwareplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkToddyCat APT Targets ESET Bug to Load Silent Malwareplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoEverest ransomware's dark web leak site defaced, now offlineplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkEverest ransomware's dark web leak site defaced, now offlineplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 20 hours agoCISA braces for more cuts, threat-intel efforts are doomedplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkCISA braces for more cuts, threat-intel efforts are doomedplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 20 hours agomessage-square0fedilink
Alphane Moon@lemmy.worldEnglish · 2 days agoWinRAR security flaw ignores Windows Mark of the Web security warningsplus-squarewww.tomshardware.comexternal-linkmessage-square10fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkWinRAR security flaw ignores Windows Mark of the Web security warningsplus-squarewww.tomshardware.comAlphane Moon@lemmy.worldEnglish · 2 days agomessage-square10fedilink
Nemeski@lemm.eeEnglish · 3 days agoCyberattacks by AI agents are comingplus-squarewww.technologyreview.comexternal-linkmessage-square8fedilinkarrow-up131arrow-down12
arrow-up129arrow-down1external-linkCyberattacks by AI agents are comingplus-squarewww.technologyreview.comNemeski@lemm.eeEnglish · 3 days agomessage-square8fedilink
drspod@lemmy.mlEnglish · 1 day agoMalicious VSCode extensions infect Windows with cryptominersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMalicious VSCode extensions infect Windows with cryptominersplus-squarewww.bleepingcomputer.comdrspod@lemmy.mlEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNew Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoaderplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoaderplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
boredsquirrel@slrpnk.netEnglish · 1 day agoHow curl developers write safe(r) code in Cplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkHow curl developers write safe(r) code in Cplus-squarewww.youtube.comboredsquirrel@slrpnk.netEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoE-ZPass toll payment texts return in massive phishing waveplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkE-ZPass toll payment texts return in massive phishing waveplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoPython JSON Logger Vulnerability Enables Remote Code Execution - PoC Releasedplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkPython JSON Logger Vulnerability Enables Remote Code Execution - PoC Releasedplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Tea@programming.devEnglish · 1 day agoHow ToddyCat tried to hide behind AV software.securelist.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHow ToddyCat tried to hide behind AV software.securelist.comTea@programming.devEnglish · 1 day agomessage-square0fedilink
maltfield@monero.townEnglish · 3 days agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square16fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@monero.townEnglish · 3 days agomessage-square16fedilink
Kid@sh.itjust.worksMEnglish · 6 days ago65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comexternal-linkmessage-square14fedilinkarrow-up189arrow-down11
arrow-up188arrow-down1external-link65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square14fedilink
Nemeski@lemm.eeEnglish · 4 days agoMalicious VPN Extensions on Chrome Web Store Infect 139,000 Usersplus-squarecyberinsider.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkMalicious VPN Extensions on Chrome Web Store Infect 139,000 Usersplus-squarecyberinsider.comNemeski@lemm.eeEnglish · 4 days agomessage-square0fedilink
onlinepersona@programming.devEnglish · 5 days agoApple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)plus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up121arrow-down13
arrow-up118arrow-down1external-linkApple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)plus-squarearstechnica.comonlinepersona@programming.devEnglish · 5 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comexternal-linkmessage-square5fedilinkarrow-up134arrow-down112
arrow-up122arrow-down1external-linkiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square5fedilink