BrikoX@lemmy.zipEnglish · 4 months agoA Sneaky Phish Just Grabbed my Mailchimp Mailing Listplus-squarewww.troyhunt.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkA Sneaky Phish Just Grabbed my Mailchimp Mailing Listplus-squarewww.troyhunt.comBrikoX@lemmy.zipEnglish · 4 months agomessage-square1linkfedilink
PhilipTheBucket@ponder.catEnglish · 4 months agoPublic-facing Kubernetes clusters at risk of total takeoverplus-squarego.theregister.comexternal-linkmessage-square7linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkPublic-facing Kubernetes clusters at risk of total takeoverplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 4 months agomessage-square7linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoNew Phishing Campaign Targets macOS Users with Fake Security Alertsplus-squarehackread.comexternal-linkmessage-square3linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkNew Phishing Campaign Targets macOS Users with Fake Security Alertsplus-squarehackread.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square3linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoLinux kernel Rust module for rootkit detectionplus-squareblog.thalium.reexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkLinux kernel Rust module for rootkit detectionplus-squareblog.thalium.reKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoCyberattack takes down Ukrainian state railway’s online servicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkCyberattack takes down Ukrainian state railway’s online servicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square1linkfedilink
Nemeski@lemm.eeEnglish · 4 months agoFBI warnings are true—fake file converters do push malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3linkfedilinkarrow-up132arrow-down10
arrow-up132arrow-down1external-linkFBI warnings are true—fake file converters do push malwareplus-squarewww.bleepingcomputer.comNemeski@lemm.eeEnglish · 4 months agomessage-square3linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoNew SvcStealer Malware Attacking Users To Steal Sensitive Data From Browsers & Appsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNew SvcStealer Malware Attacking Users To Steal Sensitive Data From Browsers & Appsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoNew VanHelsingRaaS Attacking Linux, BSD, ARM, and ESXi Systemsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNew VanHelsingRaaS Attacking Linux, BSD, ARM, and ESXi Systemsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoVSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomwareplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkVSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomwareplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoMedusa ransomware uses malicious Windows driver ABYSSWORKER to disable security toolsplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkMedusa ransomware uses malicious Windows driver ABYSSWORKER to disable security toolsplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoCloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systemsplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systemsplus-squarehackread.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoHidden Threats: How Microsoft 365 Backups Store Risks for Future Attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-linkHidden Threats: How Microsoft 365 Backups Store Risks for Future Attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
_synack@sh.itjust.worksEnglish · edit-24 months agoSteampipe: How to secure API credentials?plus-squaresh.itjust.worksimagemessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1imageSteampipe: How to secure API credentials?plus-squaresh.itjust.works_synack@sh.itjust.worksEnglish · edit-24 months agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoNation-State 'Paragon' Spyware Infections Target Civil Societyplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNation-State 'Paragon' Spyware Infections Target Civil Societyplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoCoinbase was primary target of recent GitHub Actions breachesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCoinbase was primary target of recent GitHub Actions breachesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoCloudflare now blocks all unencrypted traffic to its API endpointsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkCloudflare now blocks all unencrypted traffic to its API endpointsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoMicrosoft Trusted Signing service abused to code-sign malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkMicrosoft Trusted Signing service abused to code-sign malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoNext.js and the corrupt middleware: the authorizing artifactplus-squarezhero-web-sec.github.ioexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNext.js and the corrupt middleware: the authorizing artifactplus-squarezhero-web-sec.github.ioKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoCybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaignplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaignplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 months agoOracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Recordsplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkOracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Recordsplus-squarehackread.comKid@sh.itjust.worksMEnglish · 4 months agomessage-square0linkfedilink