Kid@sh.itjust.worksMEnglish · 19 minutes agoVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 19 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 minutes agoNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 21 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 minutes agoPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 20 minutes agomessage-square0fedilink
AmbiguousProps@lemmy.todayEnglish · 2 hours agoCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerabilityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerabilityplus-squarethehackernews.comAmbiguousProps@lemmy.todayEnglish · 2 hours agomessage-square0fedilink
AmbiguousProps@lemmy.todayEnglish · 2 hours agoGitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Accessplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Accessplus-squarethehackernews.comAmbiguousProps@lemmy.todayEnglish · 2 hours agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 day agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square15fedilinkarrow-up158arrow-down110
arrow-up148arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 1 day agomessage-square15fedilink
Kid@sh.itjust.worksMEnglish · 16 hours agoCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govKid@sh.itjust.worksMEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 23 hours agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0fedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksMEnglish · 23 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 23 hours agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 23 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 23 hours ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 23 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 23 hours agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 23 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square15fedilinkarrow-up172arrow-down10
arrow-up172arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square15fedilink
BrikoX@lemmy.zipEnglish · edit-21 day agoNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down11
arrow-up115arrow-down1external-linkNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-21 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comexternal-linkmessage-square34fedilinkarrow-up1209arrow-down18
arrow-up1201arrow-down1external-linkWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square34fedilink
floofloof@lemmy.caEnglish · 3 days agoChinese scientists hack military grade encryption on quantum computer: paperplus-squarewww.scmp.comexternal-linkmessage-square7fedilinkarrow-up127arrow-down16
arrow-up121arrow-down1external-linkChinese scientists hack military grade encryption on quantum computer: paperplus-squarewww.scmp.comfloofloof@lemmy.caEnglish · 3 days agomessage-square7fedilink
BrikoX@lemmy.zipEnglish · 4 days ago1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companiesplus-squaregist.github.comexternal-linkmessage-square11fedilinkarrow-up178arrow-down10
arrow-up178arrow-down1external-link1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companiesplus-squaregist.github.comBrikoX@lemmy.zipEnglish · 4 days agomessage-square11fedilink