Kid@sh.itjust.worksMEnglish · 3 days agoMassive RSA Encryption Flaw Exposes Millions Of IoT Devices To Attackplus-squareinformationsecuritybuzz.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMassive RSA Encryption Flaw Exposes Millions Of IoT Devices To Attackplus-squareinformationsecuritybuzz.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....plus-squarewww.cobaltstrike.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCobalt Strike 4.11: Shhhhhh, Beacon is Sleeping....plus-squarewww.cobaltstrike.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoSocGholish Malware Facilitates RansomHub Distributionplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSocGholish Malware Facilitates RansomHub Distributionplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoGoogle's New YouTube Warning: No Ad Blockers or Lose Your Account?plus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle's New YouTube Warning: No Ad Blockers or Lose Your Account?plus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNegative Exposure: Edimax Network Cameras Used to Spread Miraiwww.akamai.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10cross-posted to: [email protected]
arrow-up11arrow-down1external-linkNegative Exposure: Edimax Network Cameras Used to Spread Miraiwww.akamai.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilinkcross-posted to: [email protected]
Kid@sh.itjust.worksMEnglish · 3 days agoINDOHAXSEC Indonesian Hacking Collective | Arctic Wolfplus-squarearcticwolf.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkINDOHAXSEC Indonesian Hacking Collective | Arctic Wolfplus-squarearcticwolf.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoOctoV2 Android Banking Trojan Masquerades as Deepseek AI in Phishing Attackplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOctoV2 Android Banking Trojan Masquerades as Deepseek AI in Phishing Attackplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoMicrosoft: New RAT malware used for crypto theft, reconnaissanceplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft: New RAT malware used for crypto theft, reconnaissanceplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoChina-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operationplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChina-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operationplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoHackers target AI and crypto as software supply chain risks grow - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers target AI and crypto as software supply chain risks grow - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoHackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Weekplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Weekplus-squarehackread.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoWestern Alliance Bank Notifies 21,889 Consumers of Recent Data Breach Stemming from Software Vulnerability | JD Supraplus-squarewww.jdsupra.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWestern Alliance Bank Notifies 21,889 Consumers of Recent Data Breach Stemming from Software Vulnerability | JD Supraplus-squarewww.jdsupra.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoHackers claim they’ve breached Orange and have “very detailed” informationplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers claim they’ve breached Orange and have “very detailed” informationplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 4 days ago'Dead simple' RCE exploit in Apache Tomcat under attackplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link'Dead simple' RCE exploit in Apache Tomcat under attackplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoWidespread Coinbase phishing attack uncoveredplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWidespread Coinbase phishing attack uncoveredplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoAttackers use CSS to create evasive phishing messagesplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttackers use CSS to create evasive phishing messagesplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoWarning over free online file converters that actually install malwareplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWarning over free online file converters that actually install malwareplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoCISA Flags Critical Ivanti Vulnerabilities Actively Exploited In The Wildplus-squareinformationsecuritybuzz.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Flags Critical Ivanti Vulnerabilities Actively Exploited In The Wildplus-squareinformationsecuritybuzz.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink