Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 minutes agoManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkManufacturers Rank as Ransomware's Biggest Targetplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 23 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkThe fix for BGP’s weaknesses – RPKI – has issues of its ownplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comexternal-linkmessage-square5fedilinkarrow-up130arrow-down12
arrow-up128arrow-down1external-linkNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairingplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square5fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoCritical Zimbra Vulnerability Exploited One Day After PoC Releaseplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCritical Zimbra Vulnerability Exploited One Day After PoC Releaseplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 24 hours agoNew PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keyshackread.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkNew PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keyshackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 24 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoRussia exploited Evil Corp relationship for NATO attacksplus-squarewww.theregister.comexternal-linkmessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkRussia exploited Evil Corp relationship for NATO attacksplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNew Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnetplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkNew Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnetplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoCISA Warns of Four Vulnerabilities that Exploited Actively in the Wildplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up128arrow-down11
arrow-up127arrow-down1external-linkCISA Warns of Four Vulnerabilities that Exploited Actively in the Wildplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up152arrow-down11
arrow-up151arrow-down1external-linkThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square3fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoJPCERT shares Windows Event Log tips to detect ransomware attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkJPCERT shares Windows Event Log tips to detect ransomware attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNorth Korea Hackers Linked to Breach of German Missile Manufacturerplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkNorth Korea Hackers Linked to Breach of German Missile Manufacturerplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoWestern Digital My Cloud Devices Flaw Let Attackers Execute Arbitrary Codeplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkWestern Digital My Cloud Devices Flaw Let Attackers Execute Arbitrary Codeplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comexternal-linkmessage-square1fedilinkarrow-up132arrow-down10
arrow-up132arrow-down1external-linkUS reaches $31.5 million settlement with T-Mobile over data breachesplus-squarewww.reuters.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoMedia giant AFP hit by cyberattack impacting news delivery servicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMedia giant AFP hit by cyberattack impacting news delivery servicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoGorillaBot Emerged As King For DDoS Attacks With 300,000+ Commandsplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkGorillaBot Emerged As King For DDoS Attacks With 300,000+ Commandsplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoCloudflare WAF bypass for XSSplus-squarewaf-bypass.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkCloudflare WAF bypass for XSSplus-squarewaf-bypass.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoIsrael army hacked the communication network of the Beirut Airport control towerplus-squaresecurityaffairs.comexternal-linkmessage-square3fedilinkarrow-up170arrow-down10
arrow-up170arrow-down1external-linkIsrael army hacked the communication network of the Beirut Airport control towerplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square3fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoNovel Exploit Chain Enables Windows UAC Bypassplus-squarewww.darkreading.comexternal-linkmessage-square1fedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkNovel Exploit Chain Enables Windows UAC Bypassplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoMicrosoft: Windows Recall now can be removed, is more secureplus-squarewww.bleepingcomputer.comexternal-linkmessage-square15fedilinkarrow-up155arrow-down11
arrow-up154arrow-down1external-linkMicrosoft: Windows Recall now can be removed, is more secureplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square15fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoTails OS merges with Tor Project for better privacy, securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up164arrow-down10
arrow-up164arrow-down1external-linkTails OS merges with Tor Project for better privacy, securityplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square1fedilink
minus-squareKid@sh.itjust.worksOPMtoCybersecurity@sh.itjust.works•Remote attack on pagers used by Hezbollah caused 9 deaths and thousands of injurieslinkfedilinkEnglisharrow-up12·15 days agoUpdate: Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (https://www.nytimes.com/2024/09/17/world/middleeast/israel-hezbollah-pagers-explosives.html) linkfedilink
minus-squareKid@sh.itjust.worksMtoCybersecurity@sh.itjust.works•If you had to access an unfamiliar flash drive (or other data storage), what safety precautions would you take?linkfedilinkEnglisharrow-up2·30 days agoYou can use https://tails.net/ booting from another flash drive in memory only. linkfedilink
Update: Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (https://www.nytimes.com/2024/09/17/world/middleeast/israel-hezbollah-pagers-explosives.html)