Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoLazarus Group's latest heist hits hundreds globallyplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkLazarus Group's latest heist hits hundreds globallyplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoNew RDP Exploit Allows Attackers to Take Over Windows and Browser Sessionsplus-squaregbhackers.comexternal-linkmessage-square4fedilinkarrow-up125arrow-down12
arrow-up123arrow-down1external-linkNew RDP Exploit Allows Attackers to Take Over Windows and Browser Sessionsplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square4fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoTeamViewer Clients Vulnerability Leads to Privilege Escalationplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkTeamViewer Clients Vulnerability Leads to Privilege Escalationplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoTorNet: A New Backdoor That Uses TOR to Anonymize C2 Communicationplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTorNet: A New Backdoor That Uses TOR to Anonymize C2 Communicationplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoCVE-2024-56614 & CVE-2024-56615: PoC Exploits Released for Severe eBPF Vulnerabilities in Linux Kernelplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCVE-2024-56614 & CVE-2024-56615: PoC Exploits Released for Severe eBPF Vulnerabilities in Linux Kernelplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoFBI seizes major cybercrime forums in coordinated domain takedownplus-squarecyberscoop.comexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkFBI seizes major cybercrime forums in coordinated domain takedownplus-squarecyberscoop.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoTime Bandit ChatGPT jailbreak bypasses safeguards on sensitive topicsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up132arrow-down10
arrow-up132arrow-down1external-linkTime Bandit ChatGPT jailbreak bypasses safeguards on sensitive topicsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoNation-State Hackers Abuse Gemini AI Toolplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNation-State Hackers Abuse Gemini AI Toolplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoNew Aquabotv3 botnet malware targets Mitel command injection flawplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNew Aquabotv3 botnet malware targets Mitel command injection flawplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoLazarus Hackers Altering Legitimate Software Packages To Launch Large-Scale Cyber Attackplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkLazarus Hackers Altering Legitimate Software Packages To Launch Large-Scale Cyber Attackplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoArcus Media Ransomware Displays Novel Process Targeting, Selective Encryption and Recovery Disruptionplus-squarewww.halcyon.aiexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkArcus Media Ransomware Displays Novel Process Targeting, Selective Encryption and Recovery Disruptionplus-squarewww.halcyon.aiKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoNew SMS-Based Phishing Tool 'DevilTraff' Enables Mass Cyber Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew SMS-Based Phishing Tool 'DevilTraff' Enables Mass Cyber Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoHackers exploit critical unpatched flaw in Zyxel CPE devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkHackers exploit critical unpatched flaw in Zyxel CPE devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoAlleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devicesplus-squarex.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkAlleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devicesplus-squarex.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoMaryland healthcare network forced to shut down IT systems after ransomware attackplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkMaryland healthcare network forced to shut down IT systems after ransomware attackplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoRockwell Patches Critical, High-Severity Vulnerabilities in Several Productsplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkRockwell Patches Critical, High-Severity Vulnerabilities in Several Productsplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoDeepSeek's popularity exploited by malware peddlers, scammersplus-squarewww.helpnetsecurity.comexternal-linkmessage-square3fedilinkarrow-up115arrow-down12
arrow-up113arrow-down1external-linkDeepSeek's popularity exploited by malware peddlers, scammersplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square3fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNew Hellcat Ransomware Gang Employs Humiliation Tacticsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew Hellcat Ransomware Gang Employs Humiliation Tacticsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoLynx Ransomware Infrastructure To Attack Windows, Linux, ESXi & Affiliate Panel Uncoveredplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkLynx Ransomware Infrastructure To Attack Windows, Linux, ESXi & Affiliate Panel Uncoveredplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoHidden Text Salting Disrupts Brand Name Detection Systemsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkHidden Text Salting Disrupts Brand Name Detection Systemsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink