Kid@sh.itjust.worksMEnglish · 12 hours agoMedusa Ransomware Exploiting Fortinet Flaw For Sophisticated Ransomware Attacksplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkMedusa Ransomware Exploiting Fortinet Flaw For Sophisticated Ransomware Attacksplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 12 hours ago'Void Banshee' Exploits Second Microsoft Zero-Dayplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-link'Void Banshee' Exploits Second Microsoft Zero-Dayplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 12 hours agoBinance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Usersplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkBinance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Usersplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTfL requires in-person password resets for 30,000 employees after hackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkTfL requires in-person password resets for 30,000 employees after hackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoCybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacksplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkCybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoWindows vulnerability abused braille “spaces” in zero-day attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkWindows vulnerability abused braille “spaces” in zero-day attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 4 days ago1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comexternal-linkmessage-square11fedilinkarrow-up1104arrow-down12
arrow-up1102arrow-down1external-link1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 4 days agomessage-square11fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoCitrix Workspace App Vulnerable to Privilege Escalation Attacksplus-squaregbhackers.comexternal-linkmessage-square13fedilinkarrow-up139arrow-down10
arrow-up139arrow-down1external-linkCitrix Workspace App Vulnerable to Privilege Escalation Attacksplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square13fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoApple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackersplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up137arrow-down10
arrow-up137arrow-down1external-linkApple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackersplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square2fedilink
BrikoX@lemmy.zipEnglish · 4 days agoNorth Korean hackers target Python devs with malware disguised as coding tests — hack has been underway for a yearplus-squarewww.tomshardware.comexternal-linkmessage-square3fedilinkarrow-up149arrow-down11
arrow-up148arrow-down1external-linkNorth Korean hackers target Python devs with malware disguised as coding tests — hack has been underway for a yearplus-squarewww.tomshardware.comBrikoX@lemmy.zipEnglish · 4 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoFortinet confirms data breach after hacker claims to steal 440GB of filesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square7fedilinkarrow-up149arrow-down11
arrow-up148arrow-down1external-linkFortinet confirms data breach after hacker claims to steal 440GB of filesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square7fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoNew Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrencyplus-squarethehackernews.comexternal-linkmessage-square3fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkNew Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrencyplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square3fedilink
BrikoX@lemmy.zipEnglish · 5 days agoApple Vision Pro’s Eye Tracking Exposed What People Typeplus-squarewww.wired.comexternal-linkmessage-square11fedilinkarrow-up186arrow-down13
arrow-up183arrow-down1external-linkApple Vision Pro’s Eye Tracking Exposed What People Typeplus-squarewww.wired.comBrikoX@lemmy.zipEnglish · 5 days agomessage-square11fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoNew Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwideplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up128arrow-down12
arrow-up126arrow-down1external-linkNew Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwideplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoIvanti warns high severity CSA flaw is now exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkIvanti warns high severity CSA flaw is now exploited in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 6 days agoRogue WHOIS server gives researcher superpowers no one should ever haveplus-squarearstechnica.comexternal-linkmessage-square2fedilinkarrow-up188arrow-down11
arrow-up187arrow-down1external-linkRogue WHOIS server gives researcher superpowers no one should ever haveplus-squarearstechnica.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoTransport for London confirms customer data stolen in cyberattackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkTransport for London confirms customer data stolen in cyberattackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 6 days agoAs quantum computing threats loom, Microsoft updates its core crypto libraryplus-squarearstechnica.comexternal-linkmessage-square2fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkAs quantum computing threats loom, Microsoft updates its core crypto libraryplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 6 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoAmateurish 'CosmicBeetle' Ransomware Stings Turkish SMBsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkAmateurish 'CosmicBeetle' Ransomware Stings Turkish SMBsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 days agoNew PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computersplus-squarethehackernews.comexternal-linkmessage-square4fedilinkarrow-up128arrow-down11
arrow-up127arrow-down1external-linkNew PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computersplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 7 days agomessage-square4fedilink