Kid@sh.itjust.worksMEnglish · 16 hours agoNew report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalateplus-squareuk.finance.yahoo.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNew report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalateplus-squareuk.finance.yahoo.comKid@sh.itjust.worksMEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoApple fixes password-blurting VoiceOver bugplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkApple fixes password-blurting VoiceOver bugplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoCriminals Are Testing Their Ransomware in Africaplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkCriminals Are Testing Their Ransomware in Africaplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 23 hours agoPrince Ransomware Hits UK and US via Royal Mail Phishing Scamplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkPrince Ransomware Hits UK and US via Royal Mail Phishing Scamplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 23 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comexternal-linkmessage-square6fedilinkarrow-up176arrow-down10
arrow-up176arrow-down1external-linkTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comexternal-linkmessage-square6fedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comexternal-linkmessage-square10fedilinkarrow-up149arrow-down14
arrow-up145arrow-down1external-linkNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square10fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
return2ozma@lemmy.worldEnglish · 2 days agoMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comexternal-linkmessage-square6fedilinkarrow-up130arrow-down15
arrow-up125arrow-down1external-linkMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comreturn2ozma@lemmy.worldEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comexternal-linkmessage-square0fedilinkarrow-up122arrow-down11
arrow-up121arrow-down1external-linkWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 4 days agoT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comexternal-linkmessage-square2fedilinkarrow-up145arrow-down10
arrow-up145arrow-down1external-linkT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comBrikoX@lemmy.zipEnglish · 4 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
beirdobaggins@lemmy.worldEnglish · 3 days agoQuestioning security of hardware security keysplus-squaremessage-squaremessage-square3fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1message-squareQuestioning security of hardware security keysplus-squarebeirdobaggins@lemmy.worldEnglish · 3 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comexternal-linkmessage-square1fedilinkarrow-up132arrow-down10
arrow-up132arrow-down1external-linkUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up152arrow-down11
arrow-up151arrow-down1external-linkThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square3fedilink