Kid@sh.itjust.worksMEnglish · 3 hours agoChina's Liminal Panda APT Attacks Telcos, Steals Dataplus-squarewww.darkreading.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkChina's Liminal Panda APT Attacks Telcos, Steals Dataplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoUbuntu affected by 10-year-old flaws in needrestart packageplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkUbuntu affected by 10-year-old flaws in needrestart packageplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoCyberattack at French hospital exposes health data of 750,000 patientsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkCyberattack at French hospital exposes health data of 750,000 patientsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoUS and UK Military Social Network "Forces Penpals" Exposes SSN, PII Dataplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkUS and UK Military Social Network "Forces Penpals" Exposes SSN, PII Dataplus-squarehackread.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoRansomware Gangs Evolve: They're Now Recruiting Penetration Testersplus-squareblog.knowbe4.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkRansomware Gangs Evolve: They're Now Recruiting Penetration Testersplus-squareblog.knowbe4.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoMITRE shares 2024's top 25 most dangerous software weaknessesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMITRE shares 2024's top 25 most dangerous software weaknessesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
cron@feddit.orgEnglish · 6 hours agoD-Link says replace vulnerable routers or risk pwnageplus-squarewww.theregister.comexternal-linkmessage-square2fedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkD-Link says replace vulnerable routers or risk pwnageplus-squarewww.theregister.comcron@feddit.orgEnglish · 6 hours agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systemsplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkNew 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systemsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square2fedilink
Joker@sh.itjust.worksEnglish · edit-21 day agoMalicious QR codesplus-squareblog.talosintelligence.comexternal-linkmessage-square4fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkMalicious QR codesplus-squareblog.talosintelligence.comJoker@sh.itjust.worksEnglish · edit-21 day agomessage-square4fedilink
Joker@sh.itjust.worksEnglish · 15 hours agoSimple But Not Secure: An Empirical Security Analysis of Two-factor Authentication Systemsplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkSimple But Not Secure: An Empirical Security Analysis of Two-factor Authentication Systemsplus-squarearxiv.orgJoker@sh.itjust.worksEnglish · 15 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 13 hours agoBianLian group based in Russia, is moving from ransomware attacks to extortion.plus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkBianLian group based in Russia, is moving from ransomware attacks to extortion.plus-squarewww.cisa.govJoker@sh.itjust.worksEnglish · 13 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 19 hours ago5 Defendants Charged Federally with Running Scheme that Targeted Victim Companies via Phishing Text Messagesplus-squarewww.justice.govexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-link5 Defendants Charged Federally with Running Scheme that Targeted Victim Companies via Phishing Text Messagesplus-squarewww.justice.govJoker@sh.itjust.worksEnglish · 19 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 21 hours ago“Sad announcement” email leads to tech support scamplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link“Sad announcement” email leads to tech support scamplus-squarewww.malwarebytes.comJoker@sh.itjust.worksEnglish · 21 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 22 hours agoAdversaries Abuse Microsoft Teams and Quick Assistplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkAdversaries Abuse Microsoft Teams and Quick Assistplus-squarewww.bitdefender.comJoker@sh.itjust.worksEnglish · 22 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · edit-22 days agoFintech Giant Finastra Investigating Data Breachplus-squarekrebsonsecurity.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkFintech Giant Finastra Investigating Data Breachplus-squarekrebsonsecurity.comJoker@sh.itjust.worksEnglish · edit-22 days agomessage-square1fedilink
Joker@sh.itjust.worksEnglish · 1 day agoGhost Tap: New cash-out tactic with NFC Relayplus-squarewww.threatfabric.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkGhost Tap: New cash-out tactic with NFC Relayplus-squarewww.threatfabric.comJoker@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · edit-21 day agoThreat assessment: Ignoble Scorpius, distributors of BlackSuit ransomwareplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkThreat assessment: Ignoble Scorpius, distributors of BlackSuit ransomwareplus-squareunit42.paloaltonetworks.comJoker@sh.itjust.worksEnglish · edit-21 day agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · edit-22 days agoTSA Is Taking Steps to Enhance Cybersecurity, but Additional Actions Are Neededplus-squarewww.gao.govexternal-linkmessage-square0fedilinkarrow-up123arrow-down11
arrow-up122arrow-down1external-linkTSA Is Taking Steps to Enhance Cybersecurity, but Additional Actions Are Neededplus-squarewww.gao.govJoker@sh.itjust.worksEnglish · edit-22 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 2 days agoApple Fixes Two Exploited Vulnerabilitiesplus-squareisc.sans.eduexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkApple Fixes Two Exploited Vulnerabilitiesplus-squareisc.sans.eduJoker@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 2 days agoCybercrime-as-a-service: the industry behind online attacksplus-square360info.orgexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkCybercrime-as-a-service: the industry behind online attacksplus-square360info.orgJoker@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink