Kid@sh.itjust.worksMEnglish · 6 hours agoTelegram Messenger's Ties to Russia's FSB Revealed in New Report - Newsweekplus-squarewww.newsweek.comexternal-linkmessage-square8linkfedilinkarrow-up159arrow-down12
arrow-up157arrow-down1external-linkTelegram Messenger's Ties to Russia's FSB Revealed in New Report - Newsweekplus-squarewww.newsweek.comKid@sh.itjust.worksMEnglish · 6 hours agomessage-square8linkfedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoScammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone number | Malwarebytesplus-squarewww.malwarebytes.comexternal-linkmessage-square6linkfedilinkarrow-up130arrow-down10
arrow-up130arrow-down1external-linkScammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone number | Malwarebytesplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square6linkfedilink
Kid@sh.itjust.worksMEnglish · 6 hours agoWormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Modelsplus-squarehackread.comexternal-linkmessage-square5linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkWormGPT Makes a Comeback Using Jailbroken Grok and Mixtral Modelsplus-squarehackread.comKid@sh.itjust.worksMEnglish · 6 hours agomessage-square5linkfedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoCritical Vulnerability Patched in Citrix NetScalerplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCritical Vulnerability Patched in Citrix NetScalerplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 6 hours agoNew Linux udisks flaw lets attackers get root on major Linux distrosplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkNew Linux udisks flaw lets attackers get root on major Linux distrosplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 6 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoCISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerabilityplus-squarethehackernews.comexternal-linkmessage-square2linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerabilityplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 6 hours agoBeyondTrust warns of pre-auth RCE in Remote Support softwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkBeyondTrust warns of pre-auth RCE in Remote Support softwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 6 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoWater Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaignplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkWater Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaignplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 6 hours agoRapperBot Botnet Surges with 50,000+ Attacks Targeting Network Edge Devicesplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkRapperBot Botnet Surges with 50,000+ Attacks Targeting Network Edge Devicesplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 6 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoTaiwan Targeted In Sophisticated Malware Campaign Disguised As Tax Emailsplus-squareinformationsecuritybuzz.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkTaiwan Targeted In Sophisticated Malware Campaign Disguised As Tax Emailsplus-squareinformationsecuritybuzz.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 6 hours agoPython Protobuf Flaw Allows DoS Via Nested Messagesplus-squaresecurityonline.infoexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPython Protobuf Flaw Allows DoS Via Nested Messagesplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 6 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoScania confirms insurance claim data breach in extortion attemptplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkScania confirms insurance claim data breach in extortion attemptplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoZyxel Firewall Vulnerability Again in Attacker Crosshairsplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkZyxel Firewall Vulnerability Again in Attacker Crosshairsplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0linkfedilink
Pro@programming.devEnglish · 11 hours agoA look at ‘Tinker,’ Black Basta’s phishing fixer, negotiatorplus-squareintel471.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkA look at ‘Tinker,’ Black Basta’s phishing fixer, negotiatorplus-squareintel471.comPro@programming.devEnglish · 11 hours agomessage-square0linkfedilink
randomname@scribe.disroot.orgEnglish · 1 day agoTwo Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and moneyplus-squarewww.lighthousereports.comexternal-linkmessage-square5linkfedilinkarrow-up151arrow-down10
arrow-up151arrow-down1external-linkTwo Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and moneyplus-squarewww.lighthousereports.comrandomname@scribe.disroot.orgEnglish · 1 day agomessage-square5linkfedilink
Kid@sh.itjust.worksMEnglish · 1 day agoU.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkU.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 day agoPyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environmentsplus-squarethehackernews.comexternal-linkmessage-square1linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkPyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environmentsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 1 day agoHacker steals 1 million Cock.li user records in webmail data breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkHacker steals 1 million Cock.li user records in webmail data breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNew Veeam RCE flaw lets domain users hack backup serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNew Veeam RCE flaw lets domain users hack backup serversplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNew Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Scriptplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkNew Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Scriptplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0linkfedilink