BrikoX@lemmy.zipEnglish · 10 hours agoPolyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operatorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkPolyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operatorplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 10 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours ago'Poseidon' Mac stealer distributed via Google adsplus-squarewww.malwarebytes.comexternal-linkmessage-square2fedilinkarrow-up140arrow-down10
arrow-up140arrow-down1external-link'Poseidon' Mac stealer distributed via Google adsplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoGoogle cuts ties with Entrust in Chrome over trust issuesplus-squarewww.theregister.comexternal-linkmessage-square2fedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkGoogle cuts ties with Entrust in Chrome over trust issuesplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoGitLab vulnerability permits running pipeline tasks under another userplus-squarestackdiary.comexternal-linkmessage-square0fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkGitLab vulnerability permits running pipeline tasks under another userplus-squarestackdiary.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTeamViewer investigating intrusion of corporate IT environmentplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkTeamViewer investigating intrusion of corporate IT environmentplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoCISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilitiesplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkCISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilitiesplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNew Unfurling Hemlock threat actor floods systems with malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkNew Unfurling Hemlock threat actor floods systems with malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialMEnglish · 1 day agoPhilippines Data Security Officer Hacked 93 Different Sitesplus-squarethecyberexpress.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkPhilippines Data Security Officer Hacked 93 Different Sitesplus-squarethecyberexpress.comLanky_Pomegranate530@midwest.socialMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoResurgent malware targets Outlook and Thunderbird users but bypasses Russiaplus-squarecybernews.comexternal-linkmessage-square4fedilinkarrow-up122arrow-down11
arrow-up121arrow-down1external-linkResurgent malware targets Outlook and Thunderbird users but bypasses Russiaplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square4fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoDangerous AI Workaround: 'Skeleton Key' Unlocks Malicious Contentplus-squarewww.darkreading.comexternal-linkmessage-square6fedilinkarrow-up140arrow-down13
arrow-up137arrow-down1external-linkDangerous AI Workaround: 'Skeleton Key' Unlocks Malicious Contentplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoApple AirPods Bug Allows Eavesdroppingplus-squarewww.darkreading.comexternal-linkmessage-square4fedilinkarrow-up136arrow-down13
arrow-up133arrow-down1external-linkApple AirPods Bug Allows Eavesdroppingplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square4fedilink
Hellfire103@lemmy.caEnglish · 2 days agoCritical MOVEit vulnerability puts huge swaths of the Internet at severe riskplus-squarearstechnica.comexternal-linkmessage-square3fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkCritical MOVEit vulnerability puts huge swaths of the Internet at severe riskplus-squarearstechnica.comHellfire103@lemmy.caEnglish · 2 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoChinese State Actors Use Ransomware to Conceal Real Intentplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up124arrow-down13
arrow-up121arrow-down1external-linkChinese State Actors Use Ransomware to Conceal Real Intentplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoFederal Reserve "breached" data may actually belong to Evolve Bankplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkFederal Reserve "breached" data may actually belong to Evolve Bankplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoGoogle TAG details nightmare whack-a-mole with Dragonbridge disinfo groupplus-squarewww.scmagazine.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkGoogle TAG details nightmare whack-a-mole with Dragonbridge disinfo groupplus-squarewww.scmagazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 2 days agoSnowblind malware abuses Android security feature to bypass securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkSnowblind malware abuses Android security feature to bypass securityplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 2 days agomessage-square2fedilink
BrikoX@lemmy.zipEnglish · 2 days agoHackers target new MOVEit Transfer critical auth bypass bugplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkHackers target new MOVEit Transfer critical auth bypass bugplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoMultiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Executionplus-squarewww.cisecurity.orgexternal-linkmessage-square1fedilinkarrow-up146arrow-down10
arrow-up146arrow-down1external-linkMultiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Executionplus-squarewww.cisecurity.orgKid@sh.itjust.worksMEnglish · 3 days agomessage-square1fedilink
boredsquirrel@slrpnk.netEnglish · 3 days agoWebsites that support USB Dongle Authentication (hardware security keys)plus-squaredongleauth.comexternal-linkmessage-square0fedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkWebsites that support USB Dongle Authentication (hardware security keys)plus-squaredongleauth.comboredsquirrel@slrpnk.netEnglish · 3 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 2 days agoExploit for critical Fortra FileCatalyst Workflow SQLi flaw releasedplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkExploit for critical Fortra FileCatalyst Workflow SQLi flaw releasedplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 2 days agomessage-square0fedilink