Pro@programming.devEnglish · edit-211 hours agoStealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage.plus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkStealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage.plus-squareresearch.checkpoint.comPro@programming.devEnglish · edit-211 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoHidden Backdoors in npm Packages Let Attackers Wipe Entire Systemsplus-squarehackread.comexternal-linkmessage-square1fedilinkarrow-up131arrow-down10
arrow-up131arrow-down1external-linkHidden Backdoors in npm Packages Let Attackers Wipe Entire Systemsplus-squarehackread.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 16 hours agoCISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalogplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalogplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 16 hours agoRare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprisesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprisesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 16 hours agoCritical Vulnerability Patched in SAP NetWeaver - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCritical Vulnerability Patched in SAP NetWeaver - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 16 hours agoRust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Usersplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkRust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Usersplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoFIN6 hackers pose as job seekers to backdoor recruiters’ devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkFIN6 hackers pose as job seekers to backdoor recruiters’ devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 1 day agoChinese spy crew appears to be preparing for conflict by backdooring more than 70 critical organizations worldwideplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up158arrow-down12
arrow-up156arrow-down1external-linkChinese spy crew appears to be preparing for conflict by backdooring more than 70 critical organizations worldwideplus-squarewww.theregister.comHotznplotzn@lemmy.sdf.orgEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 16 hours agoMassive Heroku outage impacts web platforms worldwideplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMassive Heroku outage impacts web platforms worldwideplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoNearly 300,000 crash records stolen from Texas transportation department | The Record from Recorded Future Newsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkNearly 300,000 crash records stolen from Texas transportation department | The Record from Recorded Future Newsplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoGoogle Vulnerability Allowed Hackers to Access User Phone Numbersgbhackers.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkGoogle Vulnerability Allowed Hackers to Access User Phone Numbersgbhackers.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoTwo Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability | Akamaiwww.akamai.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkTwo Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability | Akamaiwww.akamai.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoNew Zealand Government Mandates DMARC Under New Secure Email Framework - Security Boulevardplus-squaresecurityboulevard.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew Zealand Government Mandates DMARC Under New Secure Email Framework - Security Boulevardplus-squaresecurityboulevard.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoPayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkPayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoSensata Technologies says personal data stolen by ransomware gangplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSensata Technologies says personal data stolen by ransomware gangplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoResecurity | APT 41: Threat Intelligence Report and Malware Analysisplus-squarewww.resecurity.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkResecurity | APT 41: Threat Intelligence Report and Malware Analysisplus-squarewww.resecurity.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoSentinelOne shares new details on China-linked breach attemptplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkSentinelOne shares new details on China-linked breach attemptplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square0fedilink
OhVenus_Baby@lemmy.mlEnglish · edit-21 day agoIs Lynis (audit tool) worth using in 2025?plus-squaremessage-squaremessage-square2fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1message-squareIs Lynis (audit tool) worth using in 2025?plus-squareOhVenus_Baby@lemmy.mlEnglish · edit-21 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoCYFIRMA INDUSTRY REPORT – ENERGY & UTILITIES - CYFIRMAplus-squarewww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCYFIRMA INDUSTRY REPORT – ENERGY & UTILITIES - CYFIRMAplus-squarewww.cyfirma.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMalware found in NPM packages with 1 million weekly downloadsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square4fedilinkarrow-up141arrow-down10
arrow-up141arrow-down1external-linkMalware found in NPM packages with 1 million weekly downloadsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square4fedilink