Kid@sh.itjust.worksMEnglish · 1 month agoTfL requires in-person password resets for 30,000 employees after hackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTfL requires in-person password resets for 30,000 employees after hackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoWindows vulnerability abused braille “spaces” in zero-day attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows vulnerability abused braille “spaces” in zero-day attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoCybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month ago1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link1.3 million Android-based TV boxes backdoored; researchers still don’t know howplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoApple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackersplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackersplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoIvanti warns high severity CSA flaw is now exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti warns high severity CSA flaw is now exploited in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoNorth Korean hackers target Python devs with malware disguised as coding tests — hack has been underway for a yearplus-squarewww.tomshardware.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean hackers target Python devs with malware disguised as coding tests — hack has been underway for a yearplus-squarewww.tomshardware.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoCitrix Workspace App Vulnerable to Privilege Escalation Attacksgbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCitrix Workspace App Vulnerable to Privilege Escalation Attacksgbhackers.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoNew Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrencyplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrencyplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoNew Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwideplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwideplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoTransport for London confirms customer data stolen in cyberattackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTransport for London confirms customer data stolen in cyberattackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoFortinet confirms data breach after hacker claims to steal 440GB of filesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFortinet confirms data breach after hacker claims to steal 440GB of filesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoAmateurish 'CosmicBeetle' Ransomware Stings Turkish SMBsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAmateurish 'CosmicBeetle' Ransomware Stings Turkish SMBsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoApple Vision Pro’s Eye Tracking Exposed What People Typeplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple Vision Pro’s Eye Tracking Exposed What People Typeplus-squarewww.wired.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoAs quantum computing threats loom, Microsoft updates its core crypto libraryplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAs quantum computing threats loom, Microsoft updates its core crypto libraryplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoQuad7 botnet evolves to more stealthy tactics to evade detectionplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkQuad7 botnet evolves to more stealthy tactics to evade detectionplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoNew RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDRgbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDRgbhackers.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoMicrosoft Discloses 4 Zero-Days in September Updateplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Discloses 4 Zero-Days in September Updateplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoDockerSpy: Search for images on Docker Hub, extract sensitive information - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDockerSpy: Search for images on Docker Hub, extract sensitive information - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoRogue WHOIS server gives researcher superpowers no one should ever haveplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRogue WHOIS server gives researcher superpowers no one should ever haveplus-squarearstechnica.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink