Kid@sh.itjust.worksMEnglish · 21 hours agoTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comexternal-linkmessage-square6fedilinkarrow-up172arrow-down10
arrow-up172arrow-down1external-linkTelegram revealed it shared U.S. user data with law enforcementplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 17 hours agoLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comexternal-linkmessage-square6fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkLinux malware “perfctl” behind years-long cryptomining campaignplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 17 hours agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkChina-Backed APT Group Culling Thai Government Dataplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
return2ozma@lemmy.worldEnglish · 1 day agoMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comexternal-linkmessage-square6fedilinkarrow-up133arrow-down13
arrow-up130arrow-down1external-linkMeta smart glasses can be used to dox anyone in seconds, study findsplus-squarearstechnica.comreturn2ozma@lemmy.worldEnglish · 1 day agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairinggbhackers.comexternal-linkmessage-square10fedilinkarrow-up149arrow-down15
arrow-up144arrow-down1external-linkNew Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairinggbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square10fedilink
Kid@sh.itjust.worksMEnglish · 17 hours agoNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkNorth Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 17 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comexternal-linkmessage-square0fedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkWhen CUPS Runneth Over: The Threat of DDoSplus-squarewww.akamai.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkFIN7 Gang Hides Malware in AI “Deepnude” Sitesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systemsplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 hours agoNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNorth Korea Profits as 'Stonefly' APT Swarms US Co's.plus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 21 hours agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 3 days agoT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comexternal-linkmessage-square2fedilinkarrow-up147arrow-down10
arrow-up147arrow-down1external-linkT-Mobile promises to try not to get hacked againplus-squarewww.theverge.comBrikoX@lemmy.zipEnglish · 3 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoManufacturers Rank as Ransomware's Biggest Targetwww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkManufacturers Rank as Ransomware's Biggest Targetwww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
beirdobaggins@lemmy.worldEnglish · 2 days agoQuestioning security of hardware security keysplus-squaremessage-squaremessage-square3fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1message-squareQuestioning security of hardware security keysplus-squarebeirdobaggins@lemmy.worldEnglish · 2 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoThe fix for BGP’s weaknesses – RPKI – has issues of its ownwww.theregister.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThe fix for BGP’s weaknesses – RPKI – has issues of its ownwww.theregister.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoUS reaches $31.5 million settlement with T-Mobile over data breacheswww.reuters.comexternal-linkmessage-square1fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkUS reaches $31.5 million settlement with T-Mobile over data breacheswww.reuters.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCritical Zimbra Vulnerability Exploited One Day After PoC Releasewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCritical Zimbra Vulnerability Exploited One Day After PoC Releasewww.securityweek.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up153arrow-down11
arrow-up152arrow-down1external-linkThe Playstation Network is down in a global outageplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square3fedilink
BrikoX@lemmy.zipEnglish · 3 days agoSystems used by courts and governments across the US riddled with vulnerabilitiesplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkSystems used by courts and governments across the US riddled with vulnerabilitiesplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNew PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keyshackread.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkNew PyPI Malware Poses as Crypto Wallet Tools to Steal Private Keyshackread.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoRussia exploited Evil Corp relationship for NATO attackswww.theregister.comexternal-linkmessage-square2fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkRussia exploited Evil Corp relationship for NATO attackswww.theregister.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square2fedilink