Kid@sh.itjust.worksMEnglish · 19 hours agoAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down11
arrow-up115arrow-down1external-linkAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoResearcher Discloses 36 Vulnerabilities Found in IBM Security Verify Accessplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkResearcher Discloses 36 Vulnerabilities Found in IBM Security Verify Accessplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Nemeski@lemm.eeEnglish · 4 days agoPopular Chrome Extension to Hide YouTube Shorts Turned Maliciousplus-squarecyberinsider.comexternal-linkmessage-square19fedilinkarrow-up1153arrow-down10
arrow-up1153arrow-down1external-linkPopular Chrome Extension to Hide YouTube Shorts Turned Maliciousplus-squarecyberinsider.comNemeski@lemm.eeEnglish · 4 days agomessage-square19fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCybercriminals Exploit DocuSign APIs to Send Fake Invoicesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkCybercriminals Exploit DocuSign APIs to Send Fake Invoicesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoGoogle Researchers Claim First Vulnerability Found Using AIplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down13
arrow-up114arrow-down1external-linkGoogle Researchers Claim First Vulnerability Found Using AIplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Nemeski@lemm.eeEnglish · 2 days agoHundreds of code libraries posted to NPM try to install malware on dev machinesplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up130arrow-down10
arrow-up130arrow-down1external-linkHundreds of code libraries posted to NPM try to install malware on dev machinesplus-squarearstechnica.comNemeski@lemm.eeEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoStealthy Process Injection: New Kernel Callback Table Technique Exposedplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkStealthy Process Injection: New Kernel Callback Table Technique Exposedplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoInterlock Ransomware Puts FreeBSD Servers in Critical Danger Worldwideplus-squarewww.secureblink.comexternal-linkmessage-square2fedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkInterlock Ransomware Puts FreeBSD Servers in Critical Danger Worldwideplus-squarewww.secureblink.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoMicrosoft SharePoint RCE bug exploited to breach corporate networkplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up130arrow-down10
arrow-up130arrow-down1external-linkMicrosoft SharePoint RCE bug exploited to breach corporate networkplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Alphane Moon@lemmy.worldEnglish · 5 days agoThousands of hacked TP-Link routers used in years-long account takeover attacksplus-squarearstechnica.comexternal-linkmessage-square2fedilinkarrow-up142arrow-down10
arrow-up142arrow-down1external-linkThousands of hacked TP-Link routers used in years-long account takeover attacksplus-squarearstechnica.comAlphane Moon@lemmy.worldEnglish · 5 days agomessage-square2fedilink
sv1sjp@lemmy.worldEnglish · 4 days agoOSINT with ChatGPT Search Engineplus-squarefosstodon.orgexternal-linkmessage-square0fedilinkarrow-up118arrow-down13
arrow-up115arrow-down1external-linkOSINT with ChatGPT Search Engineplus-squarefosstodon.orgsv1sjp@lemmy.worldEnglish · 4 days agomessage-square0fedilink
fox@lemm.eeEnglish · 5 days agoRCE Vulnerability in QBittorrent – Sharp Securityplus-squaresharpsec.runexternal-linkmessage-square0fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkRCE Vulnerability in QBittorrent – Sharp Securityplus-squaresharpsec.runfox@lemm.eeEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 days ago14-Year Vulnerability in qBittorrent Leaves Millions Exposed to RCE Attacksplus-squaresecurityonline.infoexternal-linkmessage-square10fedilinkarrow-up1117arrow-down15
arrow-up1112arrow-down1external-link14-Year Vulnerability in qBittorrent Leaves Millions Exposed to RCE Attacksplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 7 days agomessage-square10fedilink
Kid@sh.itjust.worksMEnglish · 6 days agoSophos reveals 5-year battle with Chinese hackers attacking network devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkSophos reveals 5-year battle with Chinese hackers attacking network devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-26 days agoDDoS site Dstat.cc seized and two suspects arrested in Germanyplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkDDoS site Dstat.cc seized and two suspects arrested in Germanyplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-26 days agomessage-square0fedilink