sv1sjp@lemmy.worldMEnglish · 41 minutes agoLazarus Group Deploys Linux FASTCash Malware to Steal Millions in Coordinated ATM Attacks | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkLazarus Group Deploys Linux FASTCash Malware to Steal Millions in Coordinated ATM Attacks | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comsv1sjp@lemmy.worldMEnglish · 41 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 53 minutes agoHuntStand - 2,795,947 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHuntStand - 2,795,947 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 53 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoCVE-2024-6197 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1strplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCVE-2024-6197 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1strplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoSilent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutionsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSilent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutionsplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up116
arrow-up116external-linkPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up119
arrow-up119external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square1fedilink
sv1sjp@lemmy.worldMEnglish · 3 hours agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaresocial.skynetcloud.siteexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaresocial.skynetcloud.sitesv1sjp@lemmy.worldMEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoWhy Do Criminals Love Phishing-as-a-Service Platforms?plus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkWhy Do Criminals Love Phishing-as-a-Service Platforms?plus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 3 hours agoLow-Level Development on Retail Android Hardware - Reconnaissance and Prototyping a Bootloaderplus-squareblog.timschumi.netexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkLow-Level Development on Retail Android Hardware - Reconnaissance and Prototyping a Bootloaderplus-squareblog.timschumi.netsv1sjp@lemmy.worldMEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up14
arrow-up14external-linkMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoFile hosting services misused for identity phishingplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkFile hosting services misused for identity phishingplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoFinding a needle in a haystack: Machine learning at the forefront of threat hunting researchplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkFinding a needle in a haystack: Machine learning at the forefront of threat hunting researchplus-squaresecurelist.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoGameVN - 1,369,485 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkGameVN - 1,369,485 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoA Single Cloud Compromise Can Feed an Army of AI Sex Botsplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkA Single Cloud Compromise Can Feed an Army of AI Sex Botsplus-squarekrebsonsecurity.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoHTML Smuggling: How Blob URLs are Abused to Deliver Phishing Contentplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkHTML Smuggling: How Blob URLs are Abused to Deliver Phishing Contentplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoCyble Sensors Uncover Cyberattacks Targeting Key Vulnerabilitiesplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCyble Sensors Uncover Cyberattacks Targeting Key Vulnerabilitiesplus-squarethecyberexpress.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink