Hotznplotzn@lemmy.sdf.orgEnglish · 2 days agoLeaked technical documents show China rehearsing cyberattacks on neighbors’ critical infrastructureplus-squaretherecord.mediaexternal-linkmessage-square2linkfedilinkarrow-up141arrow-down12
arrow-up139arrow-down1external-linkLeaked technical documents show China rehearsing cyberattacks on neighbors’ critical infrastructureplus-squaretherecord.mediaHotznplotzn@lemmy.sdf.orgEnglish · 2 days agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoGitLab Patches Multiple Vulnerabilities That Enables DoS and Cross-site Scripting Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkGitLab Patches Multiple Vulnerabilities That Enables DoS and Cross-site Scripting Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMicrosoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Daysplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkMicrosoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Daysplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoSSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploitsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkSSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploitsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCoinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategyplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCoinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategyplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoDPRK IT Workers Impersonating Individuals Using Real LinkedIn Accounts to Apply for Remote Rolesplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkDPRK IT Workers Impersonating Individuals Using Real LinkedIn Accounts to Apply for Remote Rolesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoFortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Executionplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkFortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Executionplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoGuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defensesplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkGuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defensesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoChinese cyberspies breach Singapore's four largest telcosplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkChinese cyberspies breach Singapore's four largest telcosplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoClaude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up132arrow-down10
arrow-up132arrow-down1external-linkClaude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoDutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Dataplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkDutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Dataplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoBeyondTrust warns of critical RCE flaw in remote support softwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkBeyondTrust warns of critical RCE flaw in remote support softwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoMicrosoft: Exchange Online flags legitimate emails as phishingplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkMicrosoft: Exchange Online flags legitimate emails as phishingplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoNew Node.js Based LTX Stealer Attackers Users to Exfiltrate Login Credentialsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew Node.js Based LTX Stealer Attackers Users to Exfiltrate Login Credentialsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 4 days agoChina’s Salt Typhoon hackers broke into Norwegian companiesplus-squaretechcrunch.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down12
arrow-up16arrow-down1external-linkChina’s Salt Typhoon hackers broke into Norwegian companiesplus-squaretechcrunch.comHotznplotzn@lemmy.sdf.orgEnglish · 4 days agomessage-square0linkfedilink
Karna@lemmy.mlEnglish · 5 days agoState actor targets 155 countries in 'Shadow Campaigns' espionage opplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkState actor targets 155 countries in 'Shadow Campaigns' espionage opplus-squarewww.bleepingcomputer.comKarna@lemmy.mlEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoBloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaignplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaignplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 6 days agoSubstack said a security breach discovered this week allowed an intruder to access users’ email addresses, phone numbers, and internal metadata in Octoberplus-squarewww.pcmag.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkSubstack said a security breach discovered this week allowed an intruder to access users’ email addresses, phone numbers, and internal metadata in Octoberplus-squarewww.pcmag.comInnerworld@lemmy.worldEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 7 days agoCISA orders federal agencies to replace end-of-life edge devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCISA orders federal agencies to replace end-of-life edge devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 7 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 7 days agoCompromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malwareplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCompromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malwareplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 7 days agomessage-square0linkfedilink