BrikoX@lemmy.zipEnglish · 4 days agoMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comexternal-linkmessage-square8fedilinkarrow-up1109arrow-down10
arrow-up1109arrow-down1external-linkMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · 4 days agomessage-square8fedilink
PhilipTheBucket@ponder.catEnglish · 2 days agoTrojanized Alpine Quest app geolocates Russian soldiersplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkTrojanized Alpine Quest app geolocates Russian soldiersplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 2 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-22 days agoASUS releases fix for AMI bug that lets hackers brick serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkASUS releases fix for AMI bug that lets hackers brick serversplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-22 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-24 days agoBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comexternal-linkmessage-square2fedilinkarrow-up155arrow-down11
arrow-up154arrow-down1external-linkBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · edit-24 days agomessage-square2fedilink
Amoxtli@thelemmy.clubEnglish · 4 days agoTexas city takes systems offline after cyberattackplus-squaretherecord.mediaexternal-linkmessage-square1fedilinkarrow-up135arrow-down12
arrow-up133arrow-down1external-linkTexas city takes systems offline after cyberattackplus-squaretherecord.mediaAmoxtli@thelemmy.clubEnglish · 4 days agomessage-square1fedilink
BrikoX@lemmy.zipEnglish · 3 days agoRipple’s recommended XRP library xrpl.js hacked to steal walletsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkRipple’s recommended XRP library xrpl.js hacked to steal walletsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 3 days agomessage-square1fedilink
NinjaZ@infosec.pubEnglish · 6 days agoThe Web is Brokenplus-squarejan.wildeboer.netexternal-linkmessage-square0fedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkThe Web is Brokenplus-squarejan.wildeboer.netNinjaZ@infosec.pubEnglish · 6 days agomessage-square0fedilink
ByteOnBikes@slrpnk.netEnglish · 7 days agoHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comexternal-linkmessage-square2fedilinkarrow-up127arrow-down11
arrow-up126arrow-down1external-linkHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comByteOnBikes@slrpnk.netEnglish · 7 days agomessage-square2fedilink
vf2000@lemmy.zipEnglish · 8 days agoEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euexternal-linkmessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euvf2000@lemmy.zipEnglish · 8 days agomessage-square2fedilink
recursive_recursion they/them@lemmy.caEnglish · edit-28 days agoInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comimagemessage-square0fedilinkarrow-up160arrow-down11
arrow-up159arrow-down1imageInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comrecursive_recursion they/them@lemmy.caEnglish · edit-28 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsgbhackers.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsgbhackers.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaexternal-linkmessage-square1fedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 9 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comexternal-linkmessage-square1fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square1fedilink
cm0002@lemmy.worldEnglish · 9 days agoVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationwww.youtube.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationwww.youtube.comcm0002@lemmy.worldEnglish · 9 days agomessage-square0fedilink