Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoOkta warns of "unprecedented" credential stuffing attacks on customersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOkta warns of "unprecedented" credential stuffing attacks on customersplus-squarewww.bleepingcomputer.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoMalware campaign attempts abuse of Sophos defender binariesplus-squarenews.sophos.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalware campaign attempts abuse of Sophos defender binariesplus-squarenews.sophos.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoFake job interviews target developers with new Python backdoorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFake job interviews target developers with new Python backdoorplus-squarewww.bleepingcomputer.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoDragonForce Ransomware Group Uses LockBit’s Leaked Builderplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDragonForce Ransomware Group Uses LockBit’s Leaked Builderplus-squarewww.infosecurity-magazine.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoVulnerabilities Expose Brocade SAN Appliances, Switches to Hackingplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerabilities Expose Brocade SAN Appliances, Switches to Hackingplus-squarewww.securityweek.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoWP Automatic WordPress plugin hit by millions of SQL injection attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWP Automatic WordPress plugin hit by millions of SQL injection attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoIran Dupes US Military Contractors, Gov't Agencies in Cyber Campaignplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIran Dupes US Military Contractors, Gov't Agencies in Cyber Campaignplus-squarewww.darkreading.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoBlack Hat SEO Leveraged to Distribute Malwareplus-squarewww.zscaler.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlack Hat SEO Leveraged to Distribute Malwareplus-squarewww.zscaler.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoCoralRaider attacks use CDN cache to push info-stealer malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCoralRaider attacks use CDN cache to push info-stealer malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · edit-25 months agoNETGEAR routers vulnerable to buffer overflowplus-squarejvn.jpexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNETGEAR routers vulnerable to buffer overflowplus-squarejvn.jpKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · edit-25 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoNorth Korea APT Triumvirate Spied on South Korean Defense Industry For Yearsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korea APT Triumvirate Spied on South Korean Defense Industry For Yearsplus-squarewww.darkreading.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoResearchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strikeplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strikeplus-squarethehackernews.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoHackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359) - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359) - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoRussia-linked hacking group claims to have targeted Indiana water plantplus-squareedition.cnn.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRussia-linked hacking group claims to have targeted Indiana water plantplus-squareedition.cnn.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoTensorFlow AI models at risk due to Keras API flawplus-squarewww.scmagazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTensorFlow AI models at risk due to Keras API flawplus-squarewww.scmagazine.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoVolkswagen Group’s Systems Hacked: 19,000+ Documents Stolenplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVolkswagen Group’s Systems Hacked: 19,000+ Documents Stolenplus-squaregbhackers.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agoHackers hijack antivirus updates to drop GuptiMiner malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers hijack antivirus updates to drop GuptiMiner malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 6 months agoBehavioral patterns of ransomware groups are changing - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBehavioral patterns of ransomware groups are changing - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 6 months agoMalvertising: Fake Popular Software Ads Deliver New MadMxShell Backdoorplus-squarewww.hackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalvertising: Fake Popular Software Ads Deliver New MadMxShell Backdoorplus-squarewww.hackread.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Kid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 6 months agoNespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugarplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugarplus-squarewww.darkreading.comKid@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink