Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoRansomware Threat Escalates as Scattered Spider and RansomHub Combine Forcesplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRansomware Threat Escalates as Scattered Spider and RansomHub Combine Forcesplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoAWS CDK flaw exposed accounts to full takeoverplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAWS CDK flaw exposed accounts to full takeoverplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoNorth Korean Cyber Espionage Group Tenacious Pungsan Compromises Open-Source Repositories with Backdoored npm Packagesplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNorth Korean Cyber Espionage Group Tenacious Pungsan Compromises Open-Source Repositories with Backdoored npm Packagesplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoUnitedHealth says Change Healthcare hack affects over 100 million, the largest-ever US healthcare data breachplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnitedHealth says Change Healthcare hack affects over 100 million, the largest-ever US healthcare data breachplus-squaretechcrunch.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoLarge-scale brute-force activity targeting VPNs, SSH services with commonly used login credentialsplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkLarge-scale brute-force activity targeting VPNs, SSH services with commonly used login credentialsplus-squareblog.talosintelligence.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoNew Qilin ransomware encryptor features stronger encryption, evasionplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Qilin ransomware encryptor features stronger encryption, evasionplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoMisconfigured UN Database Exposes 228GB of Gender Violence Victims' Dataplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMisconfigured UN Database Exposes 228GB of Gender Violence Victims' Dataplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoAttackers Target Crypto Wallets Using Codeless Webflow Phishing Pagesplus-squarewww.netskope.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttackers Target Crypto Wallets Using Codeless Webflow Phishing Pagesplus-squarewww.netskope.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoNew Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detectionplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detectionplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoNew malware family NotLockBit aims ransomware attacks toward macOSplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew malware family NotLockBit aims ransomware attacks toward macOSplus-squarewww.scworld.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoXerox Printers Vulnerable to Remote Code Execution Attacksplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkXerox Printers Vulnerable to Remote Code Execution Attacksplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days ago'Prometei' Botnet Spreads its Cryptojacker Worldwideplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link'Prometei' Botnet Spreads its Cryptojacker Worldwideplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoEmbargo Ransomware Gang Deploys Customized Defense Evasion Toolsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEmbargo Ransomware Gang Deploys Customized Defense Evasion Toolsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoNew Malware WarmCookie Targets Users with Malicious Linksplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Malware WarmCookie Targets Users with Malicious Linksplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoLazarus Group Exploits Chrome Zero-Day in Latest Campaignplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLazarus Group Exploits Chrome Zero-Day in Latest Campaignplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoCisco Patches Vulnerability Exploited in Large-Scale Brute-Force Campaignplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco Patches Vulnerability Exploited in Large-Scale Brute-Force Campaignplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoRussia says 'unprecedented' cyber attack hits foreign ministry amid BRICS summitplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRussia says 'unprecedented' cyber attack hits foreign ministry amid BRICS summitplus-squarewww.reuters.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoResearchers Reveal 'Deceptive Delight' Method to Jailbreak AI Modelsplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers Reveal 'Deceptive Delight' Method to Jailbreak AI Modelsplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoMallox Ransomware Vulnerability Let Victims Decrypt Filesplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMallox Ransomware Vulnerability Let Victims Decrypt Filesplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoFortiGate admins report active exploitation 0-day. Vendor isn’t talking.plus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFortiGate admins report active exploitation 0-day. Vendor isn’t talking.plus-squarearstechnica.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink