Kid@sh.itjust.worksMEnglish · 8 days agoHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 8 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 8 days agoGerman Law Could Protect Researchers Reporting Vulnsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGerman Law Could Protect Researchers Reporting Vulnsplus-squarewww.darkreading.comBrikoX@lemmy.zipEnglish · 8 days agomessage-square0fedilink
Super_gamer46861@lemmy.worldEnglish · 8 days agoAn encrypted and anti-forensic public web chat serverplus-squarelemmy.worldimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageAn encrypted and anti-forensic public web chat serverplus-squarelemmy.worldSuper_gamer46861@lemmy.worldEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 days agoAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoStealthy Process Injection: New Kernel Callback Table Technique Exposedplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealthy Process Injection: New Kernel Callback Table Technique Exposedplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoGoogle Researchers Claim First Vulnerability Found Using AIplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Researchers Claim First Vulnerability Found Using AIplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 days agoCybercriminals Exploit DocuSign APIs to Send Fake Invoicesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybercriminals Exploit DocuSign APIs to Send Fake Invoicesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 10 days agomessage-square0fedilink
Nemeski@lemm.eeEnglish · 11 days agoHundreds of code libraries posted to NPM try to install malware on dev machinesplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHundreds of code libraries posted to NPM try to install malware on dev machinesplus-squarearstechnica.comNemeski@lemm.eeEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 days agoMicrosoft SharePoint RCE bug exploited to breach corporate networkplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft SharePoint RCE bug exploited to breach corporate networkplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 days agoInterlock Ransomware Puts FreeBSD Servers in Critical Danger Worldwideplus-squarewww.secureblink.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInterlock Ransomware Puts FreeBSD Servers in Critical Danger Worldwideplus-squarewww.secureblink.comKid@sh.itjust.worksMEnglish · 11 days agomessage-square0fedilink
Nemeski@lemm.eeEnglish · 12 days agoPopular Chrome Extension to Hide YouTube Shorts Turned Maliciousplus-squarecyberinsider.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPopular Chrome Extension to Hide YouTube Shorts Turned Maliciousplus-squarecyberinsider.comNemeski@lemm.eeEnglish · 12 days agomessage-square0fedilink
sv1sjp@lemmy.worldEnglish · 13 days agoOSINT with ChatGPT Search Engineplus-squarefosstodon.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOSINT with ChatGPT Search Engineplus-squarefosstodon.orgsv1sjp@lemmy.worldEnglish · 13 days agomessage-square0fedilink
fox@lemm.eeEnglish · 13 days agoRCE Vulnerability in QBittorrent – Sharp Securityplus-squaresharpsec.runexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRCE Vulnerability in QBittorrent – Sharp Securityplus-squaresharpsec.runfox@lemm.eeEnglish · 13 days agomessage-square0fedilink
Alphane Moon@lemmy.worldEnglish · 13 days agoThousands of hacked TP-Link routers used in years-long account takeover attacksplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThousands of hacked TP-Link routers used in years-long account takeover attacksplus-squarearstechnica.comAlphane Moon@lemmy.worldEnglish · 13 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-214 days agoDDoS site Dstat.cc seized and two suspects arrested in Germanyplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDDoS site Dstat.cc seized and two suspects arrested in Germanyplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-214 days agomessage-square0fedilink