cyrano@lemmy.dbzer0.comEnglish · 7 hours agoI like my menplus-squarefeddit.orgimagemessage-square15linkfedilinkarrow-up1135arrow-down12
arrow-up1133arrow-down1imageI like my menplus-squarefeddit.orgcyrano@lemmy.dbzer0.comEnglish · 7 hours agomessage-square15linkfedilink
BrikoX@lemmy.zipEnglish · 6 days agoMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comexternal-linkmessage-square8linkfedilinkarrow-up1110arrow-down10
arrow-up1110arrow-down1external-linkMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · 6 days agomessage-square8linkfedilink
PhilipTheBucket@ponder.catEnglish · 3 days agoTrojanized Alpine Quest app geolocates Russian soldiersplus-squarego.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkTrojanized Alpine Quest app geolocates Russian soldiersplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 3 days agomessage-square0linkfedilink
BrikoX@lemmy.zipEnglish · edit-26 days agoBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comexternal-linkmessage-square2linkfedilinkarrow-up155arrow-down11
arrow-up154arrow-down1external-linkBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · edit-26 days agomessage-square2linkfedilink
BrikoX@lemmy.zipEnglish · edit-24 days agoASUS releases fix for AMI bug that lets hackers brick serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkASUS releases fix for AMI bug that lets hackers brick serversplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-24 days agomessage-square0linkfedilink
Amoxtli@thelemmy.clubEnglish · 6 days agoTexas city takes systems offline after cyberattackplus-squaretherecord.mediaexternal-linkmessage-square1linkfedilinkarrow-up135arrow-down12
arrow-up133arrow-down1external-linkTexas city takes systems offline after cyberattackplus-squaretherecord.mediaAmoxtli@thelemmy.clubEnglish · 6 days agomessage-square1linkfedilink
BrikoX@lemmy.zipEnglish · 5 days agoRipple’s recommended XRP library xrpl.js hacked to steal walletsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkRipple’s recommended XRP library xrpl.js hacked to steal walletsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 5 days agomessage-square1linkfedilink
NinjaZ@infosec.pubEnglish · 8 days agoThe Web is Brokenplus-squarejan.wildeboer.netexternal-linkmessage-square0linkfedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkThe Web is Brokenplus-squarejan.wildeboer.netNinjaZ@infosec.pubEnglish · 8 days agomessage-square0linkfedilink
ByteOnBikes@slrpnk.netEnglish · 9 days agoHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comexternal-linkmessage-square2linkfedilinkarrow-up127arrow-down11
arrow-up126arrow-down1external-linkHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comByteOnBikes@slrpnk.netEnglish · 9 days agomessage-square2linkfedilink
vf2000@lemmy.zipEnglish · 9 days agoEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euexternal-linkmessage-square2linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euvf2000@lemmy.zipEnglish · 9 days agomessage-square2linkfedilink
recursive_recursion they/them@lemmy.caEnglish · edit-210 days agoInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comimagemessage-square0linkfedilinkarrow-up159arrow-down11
arrow-up158arrow-down1imageInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comrecursive_recursion they/them@lemmy.caEnglish · edit-210 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsgbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsgbhackers.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaexternal-linkmessage-square1linkfedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 10 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 10 days agoHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comexternal-linkmessage-square1linkfedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square1linkfedilink