BrikoX@lemmy.zipEnglish · 1 month agoResearchers find SQL injection to bypass airport TSA security checksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers find SQL injection to bypass airport TSA security checksplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month ago'Voldemort' Malware Curses Orgs Using Global Tax Authoritiesplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link'Voldemort' Malware Curses Orgs Using Global Tax Authoritiesplus-squarewww.darkreading.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoBrain Cipher claims cyberattack on Olympic venueplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBrain Cipher claims cyberattack on Olympic venueplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoBeware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Daywww.akamai.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Daywww.akamai.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoFBI: RansomHub ransomware breached 210 victims since Februaryplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI: RansomHub ransomware breached 210 victims since Februaryplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoNorth Korean Hackers Launch New Wave of npm Package Attacksplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean Hackers Launch New Wave of npm Package Attacksplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoThreat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Toolplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Toolplus-squarewww.trendmicro.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoCommercial spyware vendor exploits used by Kremlin-backed hackers, Google saysplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommercial spyware vendor exploits used by Kremlin-backed hackers, Google saysplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoAttack tool update impairs Windows computersplus-squarenews.sophos.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttack tool update impairs Windows computersplus-squarenews.sophos.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoNew Tickler malware used to backdoor US govt, defense orgsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Tickler malware used to backdoor US govt, defense orgsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoAttackers Exploit Critical Atlassian Confluence Flaw for Cryptojackingplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttackers Exploit Critical Atlassian Confluence Flaw for Cryptojackingplus-squarewww.darkreading.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoGoogle increases Chrome bug bounty rewards up to $250,000plus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle increases Chrome bug bounty rewards up to $250,000plus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoHitachi Energy Vulnerabilities Plague SCADA Power Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHitachi Energy Vulnerabilities Plague SCADA Power Systemsplus-squarewww.darkreading.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoBug bounty programs take root in Russia — with possible far-reaching implicationsplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBug bounty programs take root in Russia — with possible far-reaching implicationsplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoUnpatchable 0-day in surveillance cam is being exploited to install Miraiplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnpatchable 0-day in surveillance cam is being exploited to install Miraiplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoNew LummaC2 Malware Variant Uses PowerShell, Obfuscation to Steal Dataplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew LummaC2 Malware Variant Uses PowerShell, Obfuscation to Steal Dataplus-squarehackread.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoBlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Waveplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Waveplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoLargest Healthcare Data Breaches of 2023plus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLargest Healthcare Data Breaches of 2023plus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoPoC Exploit for Zero-Click Vulnerability Made Available to the Massesplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPoC Exploit for Zero-Click Vulnerability Made Available to the Massesplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoGoogle Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitationplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitationplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink