sv1sjp@lemmy.worldMEnglish · 18 minutes agoAwSpy – New Spyware Targets South Korean Android usersplus-squarelabs.k7computing.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAwSpy – New Spyware Targets South Korean Android usersplus-squarelabs.k7computing.comsv1sjp@lemmy.worldMEnglish · 18 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 26 minutes agoCrooked Cops, Stolen Laptops & the Ghost of UGNaziplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkCrooked Cops, Stolen Laptops & the Ghost of UGNaziplus-squarekrebsonsecurity.comTuxBot@infosec.pubMBEnglish · 26 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 41 minutes agoCritical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groupsplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groupsplus-squarethecyberexpress.comTuxBot@infosec.pubMBEnglish · 41 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoGoogle: 70% of exploited flaws disclosed in 2023 were zero-daysplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGoogle: 70% of exploited flaws disclosed in 2023 were zero-daysplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoThe Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Shortplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkThe Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Shortplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoCVE-2024-43460 Dynamics 365 Business Central Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-43460 Dynamics 365 Business Central Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoSudanese brothers charged for ‘Anonymous Sudan’ attacks targeting critical infrastructure, government agencies and hospitalsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSudanese brothers charged for ‘Anonymous Sudan’ attacks targeting critical infrastructure, government agencies and hospitalsplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoA Dive into Earth Baku’s Latest Campaignplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Dive into Earth Baku’s Latest Campaignplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoIranian hackers act as brokers selling critical infrastructure accessplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkIranian hackers act as brokers selling critical infrastructure accessplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoUnit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risksplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkUnit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risksplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoPronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loaderplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loaderplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 4 hours agoNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comsv1sjp@lemmy.worldMEnglish · 4 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 18 hours agoChinese security officials call for investigation of Intel CPUs for chip failures and security flaws, says chipmaker 'threatens national security'plus-squarewww.tomshardware.comexternal-linkmessage-square1fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkChinese security officials call for investigation of Intel CPUs for chip failures and security flaws, says chipmaker 'threatens national security'plus-squarewww.tomshardware.comsv1sjp@lemmy.worldMEnglish · 18 hours agomessage-square1fedilink
mwguy@infosec.pubEnglish · 18 hours agoFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.commwguy@infosec.pubEnglish · 18 hours agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 18 hours agoBlooms Today - 3,184,010 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBlooms Today - 3,184,010 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 18 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 18 hours agoHackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activityplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 18 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 day agoMore than two dozen countries have used internet outages to sway elections: reportplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMore than two dozen countries have used internet outages to sway elections: reportplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 1 day agomessage-square0fedilink