Kid@sh.itjust.worksMEnglish · 26 days ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 26 days agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 26 days agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 26 days agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksMEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 26 days agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 26 days agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 26 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-226 days agoNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-226 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 26 days agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 26 days agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 27 days agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 27 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 27 days agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 27 days agomessage-square0fedilink
floofloof@lemmy.caEnglish · 28 days agoChinese scientists hack military grade encryption on quantum computer: paperplus-squarewww.scmp.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese scientists hack military grade encryption on quantum computer: paperplus-squarewww.scmp.comfloofloof@lemmy.caEnglish · 28 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 29 days ago1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companiesplus-squaregist.github.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companiesplus-squaregist.github.comBrikoX@lemmy.zipEnglish · 29 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 30 days agoThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 30 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 30 days agoNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 30 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 30 days agoMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 30 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 30 days agoCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 30 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 30 days agoFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 30 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 30 days agoWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comKid@sh.itjust.worksMEnglish · 30 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 30 days agoAttackers are using QR codes sneakily crafted in ASCII and blob URLs in phishing emailsplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttackers are using QR codes sneakily crafted in ASCII and blob URLs in phishing emailsplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 30 days agomessage-square0fedilink