Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoStealthy Process Injection: New Kernel Callback Table Technique Exposedplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealthy Process Injection: New Kernel Callback Table Technique Exposedplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows infected with backdoored Linux VMs in new phishing attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoGoogle Researchers Claim First Vulnerability Found Using AIplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Researchers Claim First Vulnerability Found Using AIplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agoCybercriminals Exploit DocuSign APIs to Send Fake Invoicesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybercriminals Exploit DocuSign APIs to Send Fake Invoicesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 10 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agoMicrosoft SharePoint RCE bug exploited to breach corporate networkplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft SharePoint RCE bug exploited to breach corporate networkplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agoInterlock Ransomware Puts FreeBSD Servers in Critical Danger Worldwideplus-squarewww.secureblink.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInterlock Ransomware Puts FreeBSD Servers in Critical Danger Worldwideplus-squarewww.secureblink.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agoNorth Korea's Andariel Pivots to 'Play' Ransomwareplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korea's Andariel Pivots to 'Play' Ransomwareplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agoSophos reveals 5-year battle with Chinese hackers attacking network devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSophos reveals 5-year battle with Chinese hackers attacking network devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agoNew LightSpy Spyware Version Targets iPhones with Increased Surveillance Tacticsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew LightSpy Spyware Version Targets iPhones with Increased Surveillance Tacticsplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agoStrela Stealer Targets Europe Stealthily Via WebDavplus-squarecyble.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStrela Stealer Targets Europe Stealthily Via WebDavplus-squarecyble.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 14 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoPrivilege escalation through TPM Sniffing when BitLocker PIN is enabledplus-squareblog.scrt.chexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPrivilege escalation through TPM Sniffing when BitLocker PIN is enabledplus-squareblog.scrt.chKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days ago14-Year Vulnerability in qBittorrent Leaves Millions Exposed to RCE Attacksplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link14-Year Vulnerability in qBittorrent Leaves Millions Exposed to RCE Attacksplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoHackers steal 15,000 cloud credentials from exposed Git config filesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers steal 15,000 cloud credentials from exposed Git config filesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoNorth Korean govt hackers linked to Play ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean govt hackers linked to Play ransomware attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink