Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoiPhone USB-C is hackable, but users don't need to worry yetplus-squarewww.techspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkiPhone USB-C is hackable, but users don't need to worry yetplus-squarewww.techspot.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoAWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCVplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCVplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoFCC Adopts Cybersecurity Rules in Wake of Salt Typhoonplus-squarebroadbandbreakfast.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFCC Adopts Cybersecurity Rules in Wake of Salt Typhoonplus-squarebroadbandbreakfast.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoSneaky 2FA: exposing a new AiTM Phishing-as-a-Serviceplus-squareblog.sekoia.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSneaky 2FA: exposing a new AiTM Phishing-as-a-Serviceplus-squareblog.sekoia.ioKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoMSSqlPwner: Open-source tool for pentesting MSSQL serversplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMSSqlPwner: Open-source tool for pentesting MSSQL serversplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoNSA Warns iPhone And Android Users—Disable Location Trackingplus-squarewww.forbes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNSA Warns iPhone And Android Users—Disable Location Trackingplus-squarewww.forbes.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoWolf Haldenstein law firm says 3.5 million impacted by data breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWolf Haldenstein law firm says 3.5 million impacted by data breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoThe $10 Cyber Threat Responsible for the Biggest Breaches of 2024plus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe $10 Cyber Threat Responsible for the Biggest Breaches of 2024plus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoChinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reportsplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reportsplus-squarewww.reuters.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agoFBI warns agents of call log thefts by hackers, Bloomberg News reportsplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI warns agents of call log thefts by hackers, Bloomberg News reportsplus-squarewww.reuters.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 15 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoMicrosoft catches Russian state-sponsored hackers shifting tactics to WhatsAppplus-squarecyberscoop.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft catches Russian state-sponsored hackers shifting tactics to WhatsAppplus-squarecyberscoop.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoBiden administration launches cybersecurity executive orderplus-squarewww.cnbc.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBiden administration launches cybersecurity executive orderplus-squarewww.cnbc.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoGSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesiaplus-squarewww.imperva.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesiaplus-squarewww.imperva.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoHackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealerplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealerplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoResearchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictionsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictionsplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoTrusted Apps Sneak a Bug Into UEFI Boot Processplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrusted Apps Sneak a Bug Into UEFI Boot Processplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoAIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacksplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacksplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoHackers leak configs and VPN credentials for 15,000 FortiGate devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers leak configs and VPN credentials for 15,000 FortiGate devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoMikroTik botnet uses misconfigured SPF DNS records to spread malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMikroTik botnet uses misconfigured SPF DNS records to spread malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agoRoom for error: European hotel chain exposes millions of guests' dataplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRoom for error: European hotel chain exposes millions of guests' dataplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 16 days agomessage-square0fedilink