Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 minutes agoVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 minutes agoPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 minutes agoNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 hours agoCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0fedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square15fedilinkarrow-up172arrow-down10
arrow-up172arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square15fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comexternal-linkmessage-square4fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square4fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comexternal-linkmessage-square6fedilinkarrow-up139arrow-down12
arrow-up137arrow-down1external-linkNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square6fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comexternal-linkmessage-square1fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comexternal-linkmessage-square34fedilinkarrow-up1209arrow-down18
arrow-up1201arrow-down1external-linkWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square34fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoThe Top 10 Countries Most Targeted by Cyberattacksplus-squareblogs.blackberry.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down13
arrow-up17arrow-down1external-linkThe Top 10 Countries Most Targeted by Cyberattacksplus-squareblogs.blackberry.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square1fedilink