Kid@sh.itjust.worksMEnglish · 1 month ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-21 month agoNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-21 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
floofloof@lemmy.caEnglish · 1 month agoChinese scientists hack military grade encryption on quantum computer: paperplus-squarewww.scmp.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese scientists hack military grade encryption on quantum computer: paperplus-squarewww.scmp.comfloofloof@lemmy.caEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month ago1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companiesplus-squaregist.github.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companiesplus-squaregist.github.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 month agoWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comKid@sh.itjust.worksMEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoAttackers are using QR codes sneakily crafted in ASCII and blob URLs in phishing emailsplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttackers are using QR codes sneakily crafted in ASCII and blob URLs in phishing emailsplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink