Joker@sh.itjust.worksEnglish · 12 hours agoThreat Campaign Spreads Winos4.0 Through Game Applicationplus-squarewww.fortinet.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down12
arrow-up110arrow-down1external-linkThreat Campaign Spreads Winos4.0 Through Game Applicationplus-squarewww.fortinet.comJoker@sh.itjust.worksEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoVEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malwareplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkVEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malwareplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 12 hours agoQSC: new modular framework in CloudComputating campaignsplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkQSC: new modular framework in CloudComputating campaignsplus-squaresecurelist.comJoker@sh.itjust.worksEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoEvasive ZIP Concatenation: Trojan Targets Windows Usersplus-squareperception-point.ioexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkEvasive ZIP Concatenation: Trojan Targets Windows Usersplus-squareperception-point.ioKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoGodFather Malware Now Targets 500+ Banking and Crypto Appsplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkGodFather Malware Now Targets 500+ Banking and Crypto Appsplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoCisco Identity Services Engine Flaw Bypass Authorization Mechanismsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCisco Identity Services Engine Flaw Bypass Authorization Mechanismsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoNorth Korean hackers use new macOS malware against crypto firmsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkNorth Korean hackers use new macOS malware against crypto firmsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 hours agoTexas-based oilfield supplier faces disruptions following ransomware attackplus-squaretherecord.mediaexternal-linkmessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkTexas-based oilfield supplier faces disruptions following ransomware attackplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 10 hours agomessage-square2fedilink
Dot.@feddit.orgEnglish · 4 days agoCyberattack disrupts classes at Irish technology university.plus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkCyberattack disrupts classes at Irish technology university.plus-squaretherecord.mediaDot.@feddit.orgEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoMalicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developersplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up143arrow-down11
arrow-up142arrow-down1external-linkMalicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developersplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoCISA warns of critical Palo Alto Networks bug exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkCISA warns of critical Palo Alto Networks bug exploited in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Dot.@feddit.orgEnglish · 4 days agoAttackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale.plus-squarelab.wallarm.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkAttackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale.plus-squarelab.wallarm.comDot.@feddit.orgEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 hours agoInterlock Ransomware Targets US Healthcare, IT and Government Sectorsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkInterlock Ransomware Targets US Healthcare, IT and Government Sectorsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 10 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 11 hours agoAn Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Formplus-squarewww.mdpi.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAn Effective Ensemble Approach for Preventing and Detecting Phishing Attacks in Textual Formplus-squarewww.mdpi.comJoker@sh.itjust.worksEnglish · 11 hours agomessage-square0fedilink
Dot.@feddit.orgEnglish · 4 days agoHackers Claim Access to Nokia Internal Data, Selling for $20,000.plus-squarehackread.comexternal-linkmessage-square3fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkHackers Claim Access to Nokia Internal Data, Selling for $20,000.plus-squarehackread.comDot.@feddit.orgEnglish · 4 days agomessage-square3fedilink
Dot.@feddit.orgEnglish · 4 days agoSupply Chain Attack Using Ethereum Smart Contracts to Distribute Multi-Platform Malware.plus-squarecheckmarx.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkSupply Chain Attack Using Ethereum Smart Contracts to Distribute Multi-Platform Malware.plus-squarecheckmarx.comDot.@feddit.orgEnglish · 4 days agomessage-square0fedilink
Dot.@feddit.orgEnglish · 5 days agoPrivilege escalation through TPM Sniffing when BitLocker PIN is enabled.plus-squareblog.scrt.chexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkPrivilege escalation through TPM Sniffing when BitLocker PIN is enabled.plus-squareblog.scrt.chDot.@feddit.orgEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 day agoGerman Law Could Protect Researchers Reporting Vulnsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkGerman Law Could Protect Researchers Reporting Vulnsplus-squarewww.darkreading.comBrikoX@lemmy.zipEnglish · 1 day agomessage-square0fedilink
Super_gamer46861@lemmy.worldEnglish · 1 day agoAn encrypted and anti-forensic public web chat serverplus-squarelemmy.worldimagemessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1imageAn encrypted and anti-forensic public web chat serverplus-squarelemmy.worldSuper_gamer46861@lemmy.worldEnglish · 1 day agomessage-square0fedilink