Nemeski@lemm.eeEnglish · 14 hours agoDev rejects CVE severity, makes his GitHub repo read-onlyplus-squarewww.bleepingcomputer.comexternal-linkmessage-square4fedilinkarrow-up159arrow-down11
arrow-up158arrow-down1external-linkDev rejects CVE severity, makes his GitHub repo read-onlyplus-squarewww.bleepingcomputer.comNemeski@lemm.eeEnglish · 14 hours agomessage-square4fedilink
BrikoX@lemmy.zipEnglish · 20 hours agoHackers exploit critical D-Link DIR-859 router flaw to steal passwordsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up137arrow-down10
arrow-up137arrow-down1external-linkHackers exploit critical D-Link DIR-859 router flaw to steal passwordsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 20 hours agomessage-square1fedilink
BrikoX@lemmy.zipEnglish · 20 hours agoMeet Brain Cipher — The new ransomware behind Indonesia's data center attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkMeet Brain Cipher — The new ransomware behind Indonesia's data center attackplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 20 hours agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 2 days agoPolyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operatorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkPolyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operatorplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days ago'Poseidon' Mac stealer distributed via Google adsplus-squarewww.malwarebytes.comexternal-linkmessage-square2fedilinkarrow-up143arrow-down10
arrow-up143arrow-down1external-link'Poseidon' Mac stealer distributed via Google adsplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoGoogle cuts ties with Entrust in Chrome over trust issuesplus-squarewww.theregister.comexternal-linkmessage-square2fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkGoogle cuts ties with Entrust in Chrome over trust issuesplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoGitLab vulnerability permits running pipeline tasks under another userplus-squarestackdiary.comexternal-linkmessage-square0fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkGitLab vulnerability permits running pipeline tasks under another userplus-squarestackdiary.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoTeamViewer investigating intrusion of corporate IT environmentplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkTeamViewer investigating intrusion of corporate IT environmentplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilitiesplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkCISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilitiesplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNew Unfurling Hemlock threat actor floods systems with malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkNew Unfurling Hemlock threat actor floods systems with malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoDangerous AI Workaround: 'Skeleton Key' Unlocks Malicious Contentplus-squarewww.darkreading.comexternal-linkmessage-square6fedilinkarrow-up140arrow-down13
arrow-up137arrow-down1external-linkDangerous AI Workaround: 'Skeleton Key' Unlocks Malicious Contentplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoResurgent malware targets Outlook and Thunderbird users but bypasses Russiaplus-squarecybernews.comexternal-linkmessage-square4fedilinkarrow-up122arrow-down11
arrow-up121arrow-down1external-linkResurgent malware targets Outlook and Thunderbird users but bypasses Russiaplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square4fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoApple AirPods Bug Allows Eavesdroppingplus-squarewww.darkreading.comexternal-linkmessage-square4fedilinkarrow-up136arrow-down13
arrow-up133arrow-down1external-linkApple AirPods Bug Allows Eavesdroppingplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square4fedilink
Lanky_Pomegranate530@midwest.socialMEnglish · 3 days agoPhilippines Data Security Officer Hacked 93 Different Sitesplus-squarethecyberexpress.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkPhilippines Data Security Officer Hacked 93 Different Sitesplus-squarethecyberexpress.comLanky_Pomegranate530@midwest.socialMEnglish · 3 days agomessage-square1fedilink
Hellfire103@lemmy.caEnglish · 4 days agoCritical MOVEit vulnerability puts huge swaths of the Internet at severe riskplus-squarearstechnica.comexternal-linkmessage-square3fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkCritical MOVEit vulnerability puts huge swaths of the Internet at severe riskplus-squarearstechnica.comHellfire103@lemmy.caEnglish · 4 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoChinese State Actors Use Ransomware to Conceal Real Intentplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up124arrow-down13
arrow-up121arrow-down1external-linkChinese State Actors Use Ransomware to Conceal Real Intentplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoFederal Reserve "breached" data may actually belong to Evolve Bankplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkFederal Reserve "breached" data may actually belong to Evolve Bankplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoGoogle TAG details nightmare whack-a-mole with Dragonbridge disinfo groupplus-squarewww.scmagazine.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkGoogle TAG details nightmare whack-a-mole with Dragonbridge disinfo groupplus-squarewww.scmagazine.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoMultiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Executionplus-squarewww.cisecurity.orgexternal-linkmessage-square1fedilinkarrow-up146arrow-down10
arrow-up146arrow-down1external-linkMultiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Executionplus-squarewww.cisecurity.orgKid@sh.itjust.worksMEnglish · 5 days agomessage-square1fedilink
BrikoX@lemmy.zipEnglish · 4 days agoSnowblind malware abuses Android security feature to bypass securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkSnowblind malware abuses Android security feature to bypass securityplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 4 days agomessage-square2fedilink