Kid@sh.itjust.worksMEnglish · 3 hours agoNSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuitplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkNSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuitplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoZero-Day Exploitation Targeting Palo Alto Networks Firewallplus-squarewww.rapid7.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkZero-Day Exploitation Targeting Palo Alto Networks Firewallplus-squarewww.rapid7.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square1fedilink
Branquinho@lemmy.eco.brEnglish · 1 hour agoSecurity Update - Release 1.32.5 · dani-garcia/vaultwardenplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSecurity Update - Release 1.32.5 · dani-garcia/vaultwardenplus-squaregithub.comBranquinho@lemmy.eco.brEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoWarning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentialsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWarning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentialsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-216 hours agoPhishing emails increasingly use SVG attachments to evade detectionplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkPhishing emails increasingly use SVG attachments to evade detectionplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-216 hours agomessage-square2fedilink
Joker@sh.itjust.worksEnglish · 7 hours agoExploit attempts for unpatched Citrix vulnerabilityplus-squareisc.sans.eduexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkExploit attempts for unpatched Citrix vulnerabilityplus-squareisc.sans.eduJoker@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-216 hours agoSecurity plugin flaw in millions of WordPress sites gives admin accessplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkSecurity plugin flaw in millions of WordPress sites gives admin accessplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-216 hours agomessage-square1fedilink
Joker@sh.itjust.worksEnglish · 1 day agoAncient TP-Link Backdoor Discovered by Attackersplus-squareisc.sans.eduexternal-linkmessage-square1fedilinkarrow-up137arrow-down10
arrow-up137arrow-down1external-linkAncient TP-Link Backdoor Discovered by Attackersplus-squareisc.sans.eduJoker@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Joker@sh.itjust.worksEnglish · 5 days agoJoint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructureplus-squarewww.cisa.govexternal-linkmessage-square7fedilinkarrow-up148arrow-down10
arrow-up148arrow-down1external-linkJoint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructureplus-squarewww.cisa.govJoker@sh.itjust.worksEnglish · 5 days agomessage-square7fedilink
Joker@sh.itjust.worksEnglish · 3 days agoFake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attackplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkFake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attackplus-squareunit42.paloaltonetworks.comJoker@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 4 days agoMalware being delivered by mail, warns Swiss cyber agencyplus-squaretherecord.mediaexternal-linkmessage-square2fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkMalware being delivered by mail, warns Swiss cyber agencyplus-squaretherecord.mediaJoker@sh.itjust.worksEnglish · 4 days agomessage-square2fedilink
Joker@sh.itjust.worksEnglish · 3 days agoInside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppersplus-squareblog.eclecticiq.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkInside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppersplus-squareblog.eclecticiq.comJoker@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 4 days agoAdvertisers are pushing ad and pop-up blockers using old tricksplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up131arrow-down10
arrow-up131arrow-down1external-linkAdvertisers are pushing ad and pop-up blockers using old tricksplus-squarewww.malwarebytes.comJoker@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 3 days agoSimple Include Statement Hides Casino Spamplus-squareblog.sucuri.netexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkSimple Include Statement Hides Casino Spamplus-squareblog.sucuri.netJoker@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoChatGPT allows access to underlying sandbox OS, “playbook” dataplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkChatGPT allows access to underlying sandbox OS, “playbook” dataplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 4 days agoHungary confirms hack of defense procurement agencyplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHungary confirms hack of defense procurement agencyplus-squaretherecord.mediaJoker@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 4 days agoCVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wildwww.clearskysec.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkCVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wildwww.clearskysec.comJoker@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoLeaked info of 122 million linked to B2B data aggregator breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkLeaked info of 122 million linked to B2B data aggregator breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 5 days agoNIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikelyplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkNIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikelyplus-squaretherecord.mediaJoker@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 4 days agoEvaluating Synthetic Command Attacks on Smart Voice Assistantsplus-squarearxiv.orgexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkEvaluating Synthetic Command Attacks on Smart Voice Assistantsplus-squarearxiv.orgJoker@sh.itjust.worksEnglish · 4 days agomessage-square1fedilink