Kid@sh.itjust.worksMEnglish · 17 hours agoNew report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalateplus-squareuk.finance.yahoo.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNew report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalateplus-squareuk.finance.yahoo.comKid@sh.itjust.worksMEnglish · 17 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoApple fixes password-blurting VoiceOver bugplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkApple fixes password-blurting VoiceOver bugplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoCriminals Are Testing Their Ransomware in Africaplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkCriminals Are Testing Their Ransomware in Africaplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 24 hours agoPrince Ransomware Hits UK and US via Royal Mail Phishing Scamplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkPrince Ransomware Hits UK and US via Royal Mail Phishing Scamplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 24 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comexternal-linkmessage-square6fedilinkarrow-up178arrow-down10
arrow-up178arrow-down1external-linkTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comexternal-linkmessage-square6fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comexternal-linkmessage-square10fedilinkarrow-up150arrow-down15
arrow-up145arrow-down1external-linkNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square10fedilink
return2ozma@lemmy.worldEnglish · 2 days agoMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comexternal-linkmessage-square6fedilinkarrow-up134arrow-down15
arrow-up129arrow-down1external-linkMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comreturn2ozma@lemmy.worldEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comexternal-linkmessage-square0fedilinkarrow-up122arrow-down11
arrow-up121arrow-down1external-linkWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 4 days agoT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comexternal-linkmessage-square2fedilinkarrow-up147arrow-down10
arrow-up147arrow-down1external-linkT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comBrikoX@lemmy.zipEnglish · 4 days agomessage-square2fedilink
beirdobaggins@lemmy.worldEnglish · 3 days agoQuestioning security of hardware security keysplus-squaremessage-squaremessage-square3fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1message-squareQuestioning security of hardware security keysplus-squarebeirdobaggins@lemmy.worldEnglish · 3 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comexternal-linkmessage-square1fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up153arrow-down11
arrow-up152arrow-down1external-linkThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square3fedilink