Kid@sh.itjust.worksMEnglish · 2 days agoChinese Hackers Target European Governments in Espionage Campaigns - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Hackers Target European Governments in Espionage Campaigns - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Nikolas5476@lemmy.worldEnglish · 2 days agoMatrix Protocol Surveillance and Forensic Analysis Suiteplus-squarelemmy.worldimagemessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageMatrix Protocol Surveillance and Forensic Analysis Suiteplus-squarelemmy.worldNikolas5476@lemmy.worldEnglish · 2 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCrypto platform Drift suspends services after millions stolen in security incident | The Record from Recorded Future Newsplus-squaretherecord.mediaexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrypto platform Drift suspends services after millions stolen in security incident | The Record from Recorded Future Newsplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoInfrsatructure Attacks With Physical Consequences Down 25%plus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInfrsatructure Attacks With Physical Consequences Down 25%plus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoWhatsApp malware campaign uses malicious VBS files to gain persistent access | CSO Onlineplus-squarewww.csoonline.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhatsApp malware campaign uses malicious VBS files to gain persistent access | CSO Onlineplus-squarewww.csoonline.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMercor confirms security incident tied to LiteLLM supply chain attack | The Record from Recorded Future Newsplus-squaretherecord.mediaexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMercor confirms security incident tied to LiteLLM supply chain attack | The Record from Recorded Future Newsplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCasbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Luresplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCasbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Luresplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoUK manufacturers under cyber fire with 80% reporting attacks • The Registerplus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUK manufacturers under cyber fire with 80% reporting attacks • The Registerplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoHackers exploit TrueConf zero-day to push malicious software updatesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers exploit TrueConf zero-day to push malicious software updatesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew CrystalRAT malware adds RAT, stealer and prankware featuresplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew CrystalRAT malware adds RAT, stealer and prankware featuresplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoWA local gov entity lost $350,000 in phishing attack - iTnewsplus-squarewww.itnews.com.auexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWA local gov entity lost $350,000 in phishing attack - iTnewsplus-squarewww.itnews.com.auKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoAxios npm supply chain attack: Malicious updates add remote access trojan | news | SC Mediaplus-squarewww.scworld.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAxios npm supply chain attack: Malicious updates add remote access trojan | news | SC Mediaplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCrewAI Vulnerabilities Expose Devices to Hacking - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrewAI Vulnerabilities Expose Devices to Hacking - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoTeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoVertex AI Vulnerability Exposes Google Cloud Data and Private Artifactsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVertex AI Vulnerability Exposes Google Cloud Data and Private Artifactsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoGIGABYTE Control Center vulnerable to arbitrary file write flawplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGIGABYTE Control Center vulnerable to arbitrary file write flawplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCisco source code stolen in Trivy-linked dev environment breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco source code stolen in Trivy-linked dev environment breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1linkfedilink
return2ozma@lemmy.worldEnglish · 3 days agoBehind the Curtain: AI's looming cyber nightmareplus-squarewww.axios.comexternal-linkmessage-square2linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBehind the Curtain: AI's looming cyber nightmareplus-squarewww.axios.comreturn2ozma@lemmy.worldEnglish · 3 days agomessage-square2linkfedilink
xoron@programming.devEnglish · 4 days agoP2P WhatsApp Clone – No Setup or Signupplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareP2P WhatsApp Clone – No Setup or Signupplus-squarexoron@programming.devEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoDutch Finance Ministry takes treasury banking portal offline after breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDutch Finance Ministry takes treasury banking portal offline after breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink