Kid@sh.itjust.worksMEnglish · 3 days agoWindows Defender Application Control Bypassed Using Operationalizing Browser Exploitsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up114
arrow-up114external-linkWindows Defender Application Control Bypassed Using Operationalizing Browser Exploitsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 3 days agoDivine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australiaplus-squarewww.defenceconnect.com.auexternal-linkmessage-square1linkfedilinkarrow-up111
arrow-up111external-linkDivine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australiaplus-squarewww.defenceconnect.com.auHotznplotzn@lemmy.sdf.orgEnglish · 3 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoHealthcare Cyber-Attacks Intensify, Sector Now Prime Targetplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square1linkfedilinkarrow-up111
arrow-up111external-linkHealthcare Cyber-Attacks Intensify, Sector Now Prime Targetplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoCoinbase data breach exposes customer info and government IDsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3linkfedilinkarrow-up120
arrow-up120external-linkCoinbase data breach exposes customer info and government IDsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square3linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoFrigidStealer Malware Hits macOS Users via Fake Safari Browser Updatesplus-squarehackread.comexternal-linkmessage-square1linkfedilinkarrow-up16
arrow-up16external-linkFrigidStealer Malware Hits macOS Users via Fake Safari Browser Updatesplus-squarehackread.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoRussia-linked hackers target webmail servers in Ukraine-related espionage operation - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up119
arrow-up119external-linkRussia-linked hackers target webmail servers in Ukraine-related espionage operation - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoFileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacksplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up14
arrow-up14external-linkFileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 6 days agoEuropean Vulnerability Database Launches Amid US CVE Chaosplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square7linkfedilinkarrow-up165
arrow-up165external-linkEuropean Vulnerability Database Launches Amid US CVE Chaosplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square7linkfedilink
Nemeski@lemm.eeEnglish · 5 days agoAs US vuln-tracking falters, EU enters with its own security bug databaseplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up149
arrow-up149external-linkAs US vuln-tracking falters, EU enters with its own security bug databaseplus-squarewww.theregister.comNemeski@lemm.eeEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoU.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkU.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 6 days agoCybercriminals Hide Undetectable Ransomware Inside JPG Imagesgbhackers.comexternal-linkmessage-square9linkfedilinkarrow-up133
arrow-up133external-linkCybercriminals Hide Undetectable Ransomware Inside JPG Imagesgbhackers.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square9linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoCybersecurity incident forces largest US steelmaker to take some operations offlineplus-squaretherecord.mediaexternal-linkmessage-square0linkfedilinkarrow-up18
arrow-up18external-linkCybersecurity incident forces largest US steelmaker to take some operations offlineplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoAI transforms cybercrime: researchers warn about the rise of AI agent hackersplus-squarecybernews.comexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkAI transforms cybercrime: researchers warn about the rise of AI agent hackersplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoHTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systemsplus-squarecyberpress.orgexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkHTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systemsplus-squarecyberpress.orgKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoRansomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Saysplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkRansomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Saysplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoU.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up16
arrow-up16external-linkU.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoMicrosoft Defender Vulnerability Allows Attackers to Elevate Privilegesplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up125
arrow-up125external-linkMicrosoft Defender Vulnerability Allows Attackers to Elevate Privilegesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoGlobal cybersecurity readiness remains critically low - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up16
arrow-up16external-linkGlobal cybersecurity readiness remains critically low - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoTwilio denies breach following leak of alleged Steam 2FA codesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2linkfedilinkarrow-up116
arrow-up116external-linkTwilio denies breach following leak of alleged Steam 2FA codesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoHackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwordsplus-squarecybersecuritynews.comexternal-linkmessage-square4linkfedilinkarrow-up115
arrow-up115external-linkHackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwordsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square4linkfedilink