Cybernews@infosec.exchange · 8 days agoTangerine Turkey is a VBS worm spreading via USB drives to install crypto mining malware.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageTangerine Turkey is a VBS worm spreading via USB drives to install crypto mining malware.plus-squarefedia.ioCybernews@infosec.exchange · 8 days agomessage-square0fedilink
Cybernews@infosec.exchange · 8 days agoHackers are increasingly ‘salting’ scam emails with text invisible to human readers, which deceives security systems.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1imageHackers are increasingly ‘salting’ scam emails with text invisible to human readers, which deceives security systems.plus-squarefedia.ioCybernews@infosec.exchange · 8 days agomessage-square0fedilink
Cybernews@infosec.exchange · 8 days agoA critical flaw in Meta’s AI framework allowed attackers to remotely deploy malware directly on the server hosting AI apps.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1imageA critical flaw in Meta’s AI framework allowed attackers to remotely deploy malware directly on the server hosting AI apps.plus-squarefedia.ioCybernews@infosec.exchange · 8 days agomessage-square0fedilink
Cybernews@infosec.exchange · 8 days agoThe British Museum was forced to partially close last week after a former employee attacked its IT infrastructure.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1imageThe British Museum was forced to partially close last week after a former employee attacked its IT infrastructure.plus-squarefedia.ioCybernews@infosec.exchange · 8 days agomessage-square0fedilink
Flipboard Tech Desk@flipboard.social · 9 days ago190 million people in America were affected by last year’s ransomware attack on UnitedHealth — nearly double previous estimates. @Techcrunch has more:plus-squaremessage-squaremessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1message-square190 million people in America were affected by last year’s ransomware attack on UnitedHealth — nearly double previous estimates. @Techcrunch has more:plus-squareFlipboard Tech Desk@flipboard.social · 9 days agomessage-square0fedilink
ApplSec@infosec.exchange · 10 days ago🔄 1 ENTRY CHANGE 🔄plus-squaremessage-squaremessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-square🔄 1 ENTRY CHANGE 🔄plus-squareApplSec@infosec.exchange · 10 days agomessage-square0fedilink
Miguel Afonso Caetano@tldr.nettime.org · 11 days ago"A pseudonymous coder has created and released an open source “tar pit” to indefinitely trap AI training web crawlers in an infinitely, randomly-generating series of pages to waste their time andplus-squaremessage-squaremessage-square12fedilinkarrow-up164arrow-down10
arrow-up164arrow-down1message-square"A pseudonymous coder has created and released an open source “tar pit” to indefinitely trap AI training web crawlers in an infinitely, randomly-generating series of pages to waste their time andplus-squareMiguel Afonso Caetano@tldr.nettime.org · 11 days agomessage-square12fedilink
Miguel Afonso Caetano@tldr.nettime.org · 11 days ago"Parents, students, teachers, and administrators throughout North America are smarting from what could be the biggest data breach of 2025: an intrusion into the network of a cloud-based serviceplus-squaremessage-squaremessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1message-square"Parents, students, teachers, and administrators throughout North America are smarting from what could be the biggest data breach of 2025: an intrusion into the network of a cloud-based serviceplus-squareMiguel Afonso Caetano@tldr.nettime.org · 11 days agomessage-square0fedilink
Harry Sintonen@infosec.exchange · 11 days agoWarning: Do not trust *.g.co urls! #GoogleWorkspace domain verification seems to be quite lax and allow arbitrary .g.co to be created. This allows for extremely convincing #phishing to be performedplus-squaremessage-squaremessage-square0fedilinkarrow-up143arrow-down10
arrow-up143arrow-down1message-squareWarning: Do not trust *.g.co urls! #GoogleWorkspace domain verification seems to be quite lax and allow arbitrary .g.co to be created. This allows for extremely convincing #phishing to be performedplus-squareHarry Sintonen@infosec.exchange · 11 days agomessage-square0fedilink
Software Heritage@mstdn.social · 12 days agoCheck out the program for the Software Heritage Symposium 2025, featuring panels on #CyberSecurity, #AI transparency, #openscience, and more. Join us in Paris or online:plus-squaremessage-squaremessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareCheck out the program for the Software Heritage Symposium 2025, featuring panels on #CyberSecurity, #AI transparency, #openscience, and more. Join us in Paris or online:plus-squareSoftware Heritage@mstdn.social · 12 days agomessage-square0fedilink
Cybernews@infosec.exchange · 12 days agoSonicWall alerts users about a critical 9.8 out of 10 vulnerability affecting its widely used unified, secure access gateways from the SMA 1000 series.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1imageSonicWall alerts users about a critical 9.8 out of 10 vulnerability affecting its widely used unified, secure access gateways from the SMA 1000 series.plus-squarefedia.ioCybernews@infosec.exchange · 12 days agomessage-square0fedilink
The Linux Foundation@social.lfx.dev · 12 days agoHow ready is the open source community for cybersecurity regulations? 🛡️plus-squaremessage-squaremessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareHow ready is the open source community for cybersecurity regulations? 🛡️plus-squareThe Linux Foundation@social.lfx.dev · 12 days agomessage-square0fedilink
Miguel Afonso Caetano@tldr.nettime.org · 12 days ago"This decision sheds light on the government’s liberal use of what is essential a “finders keepers” rule regarding your communication data. As a legal authority, FISA Section 702 allows theplus-squaremessage-squaremessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1message-square"This decision sheds light on the government’s liberal use of what is essential a “finders keepers” rule regarding your communication data. As a legal authority, FISA Section 702 allows theplus-squareMiguel Afonso Caetano@tldr.nettime.org · 12 days agomessage-square0fedilink
Cybernews@infosec.exchange · 12 days ago▪️ @cybernews research ▪️ Entire Georgian country population exposed in a massive data leak.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1image▪️ @cybernews research ▪️ Entire Georgian country population exposed in a massive data leak.plus-squarefedia.ioCybernews@infosec.exchange · 12 days agomessage-square0fedilink
Cybernews@infosec.exchange · 12 days agoInternational AIDS Vaccine Initiative (IAVI), a global non-profit working to develop vaccines for AIDS and HIV, had people’s sensitive details stolen.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1imageInternational AIDS Vaccine Initiative (IAVI), a global non-profit working to develop vaccines for AIDS and HIV, had people’s sensitive details stolen.plus-squarefedia.ioCybernews@infosec.exchange · 12 days agomessage-square0fedilink
Cybernews@infosec.exchange · 12 days agoA nuclear war would dominate news and social media until the end. Cyber warfare, though less visible, is already underway, experts say.plus-squarefedia.ioimagemessage-square1fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1imageA nuclear war would dominate news and social media until the end. Cyber warfare, though less visible, is already underway, experts say.plus-squarefedia.ioCybernews@infosec.exchange · 12 days agomessage-square1fedilink
Cybernews@infosec.exchange · 12 days agoNearly 50,000 vulnerable Fortinet devices are still accessible online despite the rushed patch addressing a widely exploited zero-day.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1imageNearly 50,000 vulnerable Fortinet devices are still accessible online despite the rushed patch addressing a widely exploited zero-day.plus-squarefedia.ioCybernews@infosec.exchange · 12 days agomessage-square0fedilink
Cybernews@infosec.exchange · 12 days agoFewer than 10% of companies paying a ransom recover all their data, a Hiscox survey reveals.plus-squarefedia.ioimagemessage-square3fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1imageFewer than 10% of companies paying a ransom recover all their data, a Hiscox survey reveals.plus-squarefedia.ioCybernews@infosec.exchange · 12 days agomessage-square3fedilink
Cybernews@infosec.exchange · 13 days agoAmerican Standard is allegedly breached by RansomHub⤵️plus-squaremessage-squaremessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareAmerican Standard is allegedly breached by RansomHub⤵️plus-squareCybernews@infosec.exchange · 13 days agomessage-square0fedilink
Cybernews@infosec.exchange · 13 days agoDavos leaders outlined bold plans to address cyber threats, from AI risks to geopolitical tensions, stressing digital resilience.plus-squarefedia.ioimagemessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1imageDavos leaders outlined bold plans to address cyber threats, from AI risks to geopolitical tensions, stressing digital resilience.plus-squarefedia.ioCybernews@infosec.exchange · 13 days agomessage-square0fedilink