Kid@sh.itjust.worksMEnglish · 2 hours agoFood giant WK Kellogg discloses data breach linked to Clop ransomwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkFood giant WK Kellogg discloses data breach linked to Clop ransomwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoGoogle fixes Android zero-days exploited in attacks, 60 other flawsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkGoogle fixes Android zero-days exploited in attacks, 60 other flawsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoCybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platformsplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCybercriminals exploit compromised accounts for EDR-as-a-Service (Emergency Data Requests – EDR), targeting major platformsplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoToddyCat APT Targets ESET Bug to Load Silent Malwareplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkToddyCat APT Targets ESET Bug to Load Silent Malwareplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoEverest ransomware's dark web leak site defaced, now offlineplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkEverest ransomware's dark web leak site defaced, now offlineplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 13 hours agoOracle tells customers its public cloud was compromisedplus-squarego.theregister.comexternal-linkmessage-square2fedilinkarrow-up180arrow-down10
arrow-up180arrow-down1external-linkOracle tells customers its public cloud was compromisedplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 13 hours agomessage-square2fedilink
PhilipTheBucket@ponder.catEnglish · 12 hours agoCISA braces for more cuts, threat-intel efforts are doomedplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up132arrow-down10
arrow-up132arrow-down1external-linkCISA braces for more cuts, threat-intel efforts are doomedplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 12 hours agomessage-square0fedilink
Alphane Moon@lemmy.worldEnglish · 1 day agoWinRAR security flaw ignores Windows Mark of the Web security warningsplus-squarewww.tomshardware.comexternal-linkmessage-square10fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkWinRAR security flaw ignores Windows Mark of the Web security warningsplus-squarewww.tomshardware.comAlphane Moon@lemmy.worldEnglish · 1 day agomessage-square10fedilink
drspod@lemmy.mlEnglish · 20 hours agoMalicious VSCode extensions infect Windows with cryptominersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMalicious VSCode extensions infect Windows with cryptominersplus-squarewww.bleepingcomputer.comdrspod@lemmy.mlEnglish · 20 hours agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 24 hours agoNew Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoaderplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoaderplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 24 hours agomessage-square1fedilink
Nemeski@lemm.eeEnglish · 3 days agoCyberattacks by AI agents are comingplus-squarewww.technologyreview.comexternal-linkmessage-square8fedilinkarrow-up131arrow-down12
arrow-up129arrow-down1external-linkCyberattacks by AI agents are comingplus-squarewww.technologyreview.comNemeski@lemm.eeEnglish · 3 days agomessage-square8fedilink
boredsquirrel@slrpnk.netEnglish · 22 hours agoHow curl developers write safe(r) code in Cplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkHow curl developers write safe(r) code in Cplus-squarewww.youtube.comboredsquirrel@slrpnk.netEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 24 hours agoE-ZPass toll payment texts return in massive phishing waveplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkE-ZPass toll payment texts return in massive phishing waveplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 24 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 24 hours agoPython JSON Logger Vulnerability Enables Remote Code Execution - PoC Releasedplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkPython JSON Logger Vulnerability Enables Remote Code Execution - PoC Releasedplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 24 hours agomessage-square0fedilink
Tea@programming.devEnglish · 24 hours agoHow ToddyCat tried to hide behind AV software.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHow ToddyCat tried to hide behind AV software.plus-squaresecurelist.comTea@programming.devEnglish · 24 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 6 days ago65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comexternal-linkmessage-square14fedilinkarrow-up188arrow-down11
arrow-up187arrow-down1external-link65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square14fedilink
Nemeski@lemm.eeEnglish · 4 days agoMalicious VPN Extensions on Chrome Web Store Infect 139,000 Usersplus-squarecyberinsider.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkMalicious VPN Extensions on Chrome Web Store Infect 139,000 Usersplus-squarecyberinsider.comNemeski@lemm.eeEnglish · 4 days agomessage-square0fedilink
onlinepersona@programming.devEnglish · 4 days agoApple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)plus-squarearstechnica.comexternal-linkmessage-square1fedilinkarrow-up121arrow-down13
arrow-up118arrow-down1external-linkApple chips can be hacked to leak secrets from Gmail, iCloud, and more (28 Jan 2025)plus-squarearstechnica.comonlinepersona@programming.devEnglish · 4 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoPort of Seattle says ransomware breach impacts 90,000 peopleplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkPort of Seattle says ransomware breach impacts 90,000 peopleplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comexternal-linkmessage-square5fedilinkarrow-up134arrow-down112
arrow-up122arrow-down1external-linkiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square5fedilink