TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 26 minutes agoCrooked Cops, Stolen Laptops & the Ghost of UGNaziplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkCrooked Cops, Stolen Laptops & the Ghost of UGNaziplus-squarekrebsonsecurity.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 26 minutes agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 41 minutes agoCritical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groupsplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Veeam Vulnerability CVE-2024-40711 Exploited by Ransomware Groupsplus-squarethecyberexpress.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 41 minutes agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agoThe Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Shortplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkThe Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Shortplus-squarethehackernews.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agoCVE-2024-43460 Dynamics 365 Business Central Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-43460 Dynamics 365 Business Central Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agoA Dive into Earth Baku’s Latest Campaignplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Dive into Earth Baku’s Latest Campaignplus-squarewww.trendmicro.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agoEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACplus-squarewww.trendmicro.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agoBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoGoogle: 70% of exploited flaws disclosed in 2023 were zero-daysplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGoogle: 70% of exploited flaws disclosed in 2023 were zero-daysplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agoKeebin’ with Kristina: the One with the Folding Butterfly Keyboardplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkKeebin’ with Kristina: the One with the Folding Butterfly Keyboardplus-squarehackaday.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoSudanese brothers charged for ‘Anonymous Sudan’ attacks targeting critical infrastructure, government agencies and hospitalsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSudanese brothers charged for ‘Anonymous Sudan’ attacks targeting critical infrastructure, government agencies and hospitalsplus-squaretherecord.mediaTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agoRunning PhotoPrism using Dockerplus-squarepimylifeup.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkRunning PhotoPrism using Dockerplus-squarepimylifeup.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoUnit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risksplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkUnit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risksplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agoBuilding a Raspberry Pi Pico 2-powered drone from scratchplus-squarewww.raspberrypi.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBuilding a Raspberry Pi Pico 2-powered drone from scratchplus-squarewww.raspberrypi.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoIranian hackers act as brokers selling critical infrastructure accessplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkIranian hackers act as brokers selling critical infrastructure accessplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agoRead All About It: The 2024 Supercon Site is Liveplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRead All About It: The 2024 Supercon Site is Liveplus-squarehackaday.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoPronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loaderplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loaderplus-squarewww.trustwave.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 18 hours agoHackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activityplus-squarethehackernews.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 18 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 18 hours agoBlooms Today - 3,184,010 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBlooms Today - 3,184,010 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 18 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 18 hours agoKeebin’ with Kristina: the One with the Folding Butterfly Keyboardplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkKeebin’ with Kristina: the One with the Folding Butterfly Keyboardplus-squarehackaday.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 18 hours agomessage-square0fedilink
minus-squareTuxBot@infosec.pubOPMBtoInfosec News@infosec.pub•CISA Adds Three Known Exploited Vulnerabilities to CataloglinkfedilinkEnglisharrow-up1·2 days agothank you! :D linkfedilink
thank you! :D