Alphane Moon@lemmy.worldEnglish · 2 days agoWinRAR security flaw ignores Windows Mark of the Web security warningsplus-squarewww.tomshardware.comexternal-linkmessage-square12fedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkWinRAR security flaw ignores Windows Mark of the Web security warningsplus-squarewww.tomshardware.comAlphane Moon@lemmy.worldEnglish · 2 days agomessage-square12fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoGoogle fixes Android zero-days exploited in attacks, 60 other flawsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkGoogle fixes Android zero-days exploited in attacks, 60 other flawsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square1fedilink
PhilipTheBucket@ponder.catEnglish · 1 day agoOracle tells customers its public cloud was compromisedplus-squarego.theregister.comexternal-linkmessage-square3fedilinkarrow-up194arrow-down10
arrow-up194arrow-down1external-linkOracle tells customers its public cloud was compromisedplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 1 day agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoFood giant WK Kellogg discloses data breach linked to Clop ransomwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkFood giant WK Kellogg discloses data breach linked to Clop ransomwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoCybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platformsplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platformsplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoEverest ransomware's dark web leak site defaced, now offlineplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkEverest ransomware's dark web leak site defaced, now offlineplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoToddyCat APT Targets ESET Bug to Load Silent Malwareplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkToddyCat APT Targets ESET Bug to Load Silent Malwareplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 1 day agoCISA braces for more cuts, threat-intel efforts are doomedplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkCISA braces for more cuts, threat-intel efforts are doomedplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 1 day agomessage-square0fedilink
Nemeski@lemm.eeEnglish · 3 days agoCyberattacks by AI agents are comingplus-squarewww.technologyreview.comexternal-linkmessage-square8fedilinkarrow-up131arrow-down12
arrow-up129arrow-down1external-linkCyberattacks by AI agents are comingplus-squarewww.technologyreview.comNemeski@lemm.eeEnglish · 3 days agomessage-square8fedilink
drspod@lemmy.mlEnglish · 1 day agoMalicious VSCode extensions infect Windows with cryptominersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMalicious VSCode extensions infect Windows with cryptominersplus-squarewww.bleepingcomputer.comdrspod@lemmy.mlEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoaderplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoaderplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoE-ZPass toll payment texts return in massive phishing waveplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkE-ZPass toll payment texts return in massive phishing waveplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoPython JSON Logger Vulnerability Enables Remote Code Execution - PoC Releasedplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkPython JSON Logger Vulnerability Enables Remote Code Execution - PoC Releasedplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Tea@programming.devEnglish · 2 days agoHow ToddyCat tried to hide behind AV software.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHow ToddyCat tried to hide behind AV software.plus-squaresecurelist.comTea@programming.devEnglish · 2 days agomessage-square0fedilink
maltfield@monero.townEnglish · 3 days agoWhy OAuth MUST share access token with 3rd party?!?plus-squaremessage-squaremessage-square16fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1message-squareWhy OAuth MUST share access token with 3rd party?!?plus-squaremaltfield@monero.townEnglish · 3 days agomessage-square16fedilink
Kid@sh.itjust.worksMEnglish · 7 days ago65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comexternal-linkmessage-square14fedilinkarrow-up186arrow-down11
arrow-up185arrow-down1external-link65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 7 days agomessage-square14fedilink
Nemeski@lemm.eeEnglish · 4 days agoMalicious VPN Extensions on Chrome Web Store Infect 139,000 Usersplus-squarecyberinsider.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkMalicious VPN Extensions on Chrome Web Store Infect 139,000 Usersplus-squarecyberinsider.comNemeski@lemm.eeEnglish · 4 days agomessage-square0fedilink
onlinepersona@programming.devEnglish · 5 days agoApple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)plus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up120arrow-down13
arrow-up117arrow-down1external-linkApple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)plus-squarearstechnica.comonlinepersona@programming.devEnglish · 5 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 6 days agoHacking the Call Records of Millions of Americansplus-squareevanconnelly.github.ioexternal-linkmessage-square6fedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkHacking the Call Records of Millions of Americansplus-squareevanconnelly.github.ioKid@sh.itjust.worksMEnglish · 6 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 6 days agoiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comexternal-linkmessage-square5fedilinkarrow-up134arrow-down112
arrow-up122arrow-down1external-linkiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square5fedilink