Kid@sh.itjust.worksMEnglish · 7 hours agoCoinbase data breach exposes customer info and government IDsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkCoinbase data breach exposes customer info and government IDsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoTechnical Analysis of TransferLoaderplus-squarewww.zscaler.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkTechnical Analysis of TransferLoaderplus-squarewww.zscaler.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 hours agoRussia-linked hackers target webmail servers in Ukraine-related espionage operation - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkRussia-linked hackers target webmail servers in Ukraine-related espionage operation - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 10 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoU.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkU.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoU.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkU.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 hours agoAI transforms cybercrime: researchers warn about the rise of AI agent hackersplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkAI transforms cybercrime: researchers warn about the rise of AI agent hackersplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 10 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 hours agoHTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systemsplus-squarecyberpress.orgexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systemsplus-squarecyberpress.orgKid@sh.itjust.worksMEnglish · 10 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoRansomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Saysplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRansomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Saysplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 12 hours agoCybersecurity incident forces largest US steelmaker to take some operations offlineplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCybersecurity incident forces largest US steelmaker to take some operations offlineplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoGlobal cybersecurity readiness remains critically low - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGlobal cybersecurity readiness remains critically low - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoGoogle fixes high severity Chrome flaw with public exploitplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGoogle fixes high severity Chrome flaw with public exploitplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 12 hours agoGoogle says hackers behind UK retail cyber campaign now also targeting USplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGoogle says hackers behind UK retail cyber campaign now also targeting USplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoEuropean Vulnerability Database Launches Amid US CVE Chaosplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square6fedilinkarrow-up166arrow-down11
arrow-up165arrow-down1external-linkEuropean Vulnerability Database Launches Amid US CVE Chaosplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTwilio denies breach following leak of alleged Steam 2FA codesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkTwilio denies breach following leak of alleged Steam 2FA codesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoMicrosoft Defender Vulnerability Allows Attackers to Elevate Privilegesplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkMicrosoft Defender Vulnerability Allows Attackers to Elevate Privilegesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Nemeski@lemm.eeEnglish · 2 days agoAs US vuln-tracking falters, EU enters with its own security bug databaseplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up146arrow-down11
arrow-up145arrow-down1external-linkAs US vuln-tracking falters, EU enters with its own security bug databaseplus-squarewww.theregister.comNemeski@lemm.eeEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCybercriminals Hide Undetectable Ransomware Inside JPG Imagesgbhackers.comexternal-linkmessage-square9fedilinkarrow-up133arrow-down11
arrow-up132arrow-down1external-linkCybercriminals Hide Undetectable Ransomware Inside JPG Imagesgbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square9fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoRansomware gangs join ongoing SAP NetWeaver attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkRansomware gangs join ongoing SAP NetWeaver attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
floofloof@lemmy.caEnglish · 1 day agoInsight: Rogue communication devices found in Chinese solar power invertersplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkInsight: Rogue communication devices found in Chinese solar power invertersplus-squarewww.reuters.comfloofloof@lemmy.caEnglish · 1 day agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 1 day agoChina-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabiaplus-squareblog.eclecticiq.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkChina-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabiaplus-squareblog.eclecticiq.comHotznplotzn@lemmy.sdf.orgEnglish · 1 day agomessage-square0fedilink