Kid@sh.itjust.worksMEnglish · 1 hour agoPrince Ransomware Hits UK and US via Royal Mail Phishing Scamplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPrince Ransomware Hits UK and US via Royal Mail Phishing Scamplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comexternal-linkmessage-square6fedilinkarrow-up173arrow-down10
arrow-up173arrow-down1external-linkTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comexternal-linkmessage-square6fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 17 hours agoChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 17 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comexternal-linkmessage-square10fedilinkarrow-up149arrow-down15
arrow-up144arrow-down1external-linkNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square10fedilink
return2ozma@lemmy.worldEnglish · 1 day agoMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comexternal-linkmessage-square6fedilinkarrow-up133arrow-down14
arrow-up129arrow-down1external-linkMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comreturn2ozma@lemmy.worldEnglish · 1 day agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comexternal-linkmessage-square0fedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 3 days agoT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comexternal-linkmessage-square2fedilinkarrow-up147arrow-down10
arrow-up147arrow-down1external-linkT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comBrikoX@lemmy.zipEnglish · 3 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
beirdobaggins@lemmy.worldEnglish · 2 days agoQuestioning security of hardware security keysplus-squaremessage-squaremessage-square3fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1message-squareQuestioning security of hardware security keysplus-squarebeirdobaggins@lemmy.worldEnglish · 2 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comexternal-linkmessage-square1fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCritical Zimbra Vulnerability Exploited One Day After PoC Releaseplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCritical Zimbra Vulnerability Exploited One Day After PoC Releaseplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up153arrow-down11
arrow-up152arrow-down1external-linkThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square3fedilink
BrikoX@lemmy.zipEnglish · 3 days agoSystems used by courts and governments across the US riddled with vulnerabilitiesplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkSystems used by courts and governments across the US riddled with vulnerabilitiesplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNew PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keysplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkNew PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keysplus-squarehackread.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink