Lanky_Pomegranate530@midwest.socialMEnglish · 8 months agoSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comLanky_Pomegranate530@midwest.socialMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoA patched Windows attack surface is still exploitableplus-squaremalware.newsexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA patched Windows attack surface is still exploitableplus-squaremalware.newsKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoHackers exploit Windows SmartScreen flaw to drop DarkGate malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers exploit Windows SmartScreen flaw to drop DarkGate malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoMajor CPU, Software Vendors Impacted by New GhostRace Attackplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMajor CPU, Software Vendors Impacted by New GhostRace Attackplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · edit-28 months agoAndariel Hackers Attacking Asset Management Companies To Inject Malicious Codeplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndariel Hackers Attacking Asset Management Companies To Inject Malicious Codeplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · edit-28 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoChatGPT Spills Secrets in Novel PoC Attackplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChatGPT Spills Secrets in Novel PoC Attackplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoThe effects of law enforcement takedowns on the ransomware landscape - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe effects of law enforcement takedowns on the ransomware landscape - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoPhishing Campaign Unleashes Java RATs including VCURMS and STRRATplus-squarecybermaterial.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhishing Campaign Unleashes Java RATs including VCURMS and STRRATplus-squarecybermaterial.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialMEnglish · 8 months agoChirp Systems controls access to about 50K apartment doors in the US. Last week the CSIA published a low-skill exploitplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChirp Systems controls access to about 50K apartment doors in the US. Last week the CSIA published a low-skill exploitplus-squarewww.cisa.govLanky_Pomegranate530@midwest.socialMEnglish · 8 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialMEnglish · 8 months agoPatch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodesplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPatch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodesplus-squarewww.darkreading.comLanky_Pomegranate530@midwest.socialMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoOver 12 million auth secrets and keys leaked on GitHub in 2023plus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 12 million auth secrets and keys leaked on GitHub in 2023plus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoNever-before-seen Linux malware gets installed using 1-day exploitsplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNever-before-seen Linux malware gets installed using 1-day exploitsplus-squarearstechnica.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialMEnglish · 8 months agoGoogle's Post-Quantum Upgrade Doesn't Mean We're All Protected Yetplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle's Post-Quantum Upgrade Doesn't Mean We're All Protected Yetplus-squarewww.darkreading.comLanky_Pomegranate530@midwest.socialMEnglish · 8 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialMEnglish · 8 months ago10 Security Metrics Categories CISOs Should Present to the Boardplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link10 Security Metrics Categories CISOs Should Present to the Boardplus-squarewww.darkreading.comLanky_Pomegranate530@midwest.socialMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoMicrosoft Patch Tuesday - March 2024 - SANS Internet Storm Centerplus-squareisc.sans.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Patch Tuesday - March 2024 - SANS Internet Storm Centerplus-squareisc.sans.eduKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialMEnglish · 8 months agoBuilding Cyber Resilience: Key Trends and Strategies for a Secure Future - Cybersecurity Magazineplus-squarecybersecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBuilding Cyber Resilience: Key Trends and Strategies for a Secure Future - Cybersecurity Magazineplus-squarecybersecurity-magazine.comLanky_Pomegranate530@midwest.socialMEnglish · 8 months agomessage-square0fedilink
Eezyville@sh.itjust.worksEnglish · 8 months ago[Question] Is this a secure way to generate passwordsplus-squaresh.itjust.worksimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1image[Question] Is this a secure way to generate passwordsplus-squaresh.itjust.worksEezyville@sh.itjust.worksEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoOver 15,000 hacked Roku accounts sold for 50¢ each to buy hardwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 15,000 hacked Roku accounts sold for 50¢ each to buy hardwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoCyberGate RAT Mimic As Dorks Tool To Attack Cybersecurity Professionalsgbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCyberGate RAT Mimic As Dorks Tool To Attack Cybersecurity Professionalsgbhackers.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 months agoHow Not to Become the Target of the Next Microsoft Hackplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Not to Become the Target of the Next Microsoft Hackplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 8 months agomessage-square0fedilink