dch82@lemmy.zipEnglish · 17 days agoTransport for London cyberattack?plus-squarelemmy.zipimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageTransport for London cyberattack?plus-squarelemmy.zipdch82@lemmy.zipEnglish · 17 days agomessage-square0fedilink
ALostInquirer@lemm.eeEnglish · 17 days agoIf you had to access an unfamiliar flash drive (or other data storage), what safety precautions would you take?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareIf you had to access an unfamiliar flash drive (or other data storage), what safety precautions would you take?plus-squareALostInquirer@lemm.eeEnglish · 17 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 17 days ago.NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documentsplus-squaregbhacke1.txpro1.fcomet.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link.NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documentsplus-squaregbhacke1.txpro1.fcomet.comKid@sh.itjust.worksMEnglish · 17 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 17 days agoBusiness services giant CBIZ discloses customer data breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBusiness services giant CBIZ discloses customer data breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 17 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 17 days agoGitHub comments abused to push password stealing malware masked as fixesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub comments abused to push password stealing malware masked as fixesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 17 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 17 days agoMalicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systemsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systemsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 17 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 17 days agoDurex India data breach leaks sensitive details of customersplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDurex India data breach leaks sensitive details of customersplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksMEnglish · 17 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 17 days agoCicada3301 ransomware’s Linux encryptor targets VMware ESXi systemsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCicada3301 ransomware’s Linux encryptor targets VMware ESXi systemsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 17 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 17 days agoNorth Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploitplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploitplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 17 days agomessage-square0fedilink
Jack Waterhouse@water.house · edit-218 days ago5G in Australia or Malaysia - who did it better?plus-squarewater.houseimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1image5G in Australia or Malaysia - who did it better?plus-squarewater.houseJack Waterhouse@water.house · edit-218 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 19 days agoResearchers find SQL injection to bypass airport TSA security checksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers find SQL injection to bypass airport TSA security checksplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 19 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 19 days ago'Voldemort' Malware Curses Orgs Using Global Tax Authoritiesplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link'Voldemort' Malware Curses Orgs Using Global Tax Authoritiesplus-squarewww.darkreading.comBrikoX@lemmy.zipEnglish · 19 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoBrain Cipher claims cyberattack on Olympic venueplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBrain Cipher claims cyberattack on Olympic venueplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoBeware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Daywww.akamai.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Daywww.akamai.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoFBI: RansomHub ransomware breached 210 victims since Februaryplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI: RansomHub ransomware breached 210 victims since Februaryplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoNorth Korean Hackers Launch New Wave of npm Package Attacksplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean Hackers Launch New Wave of npm Package Attacksplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoThreat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Toolplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Toolplus-squarewww.trendmicro.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 20 days agoCommercial spyware vendor exploits used by Kremlin-backed hackers, Google saysplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommercial spyware vendor exploits used by Kremlin-backed hackers, Google saysplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoAttack tool update impairs Windows computersplus-squarenews.sophos.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttack tool update impairs Windows computersplus-squarenews.sophos.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 22 days agoNew Tickler malware used to backdoor US govt, defense orgsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Tickler malware used to backdoor US govt, defense orgsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 22 days agomessage-square0fedilink