Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 4 hours agoMalware being delivered by mail, warns Swiss cyber agencyplus-squaretherecord.mediaexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMalware being delivered by mail, warns Swiss cyber agencyplus-squaretherecord.mediaJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 4 hours agomessage-square1fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 4 hours agoHungary confirms hack of defense procurement agencyplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHungary confirms hack of defense procurement agencyplus-squaretherecord.mediaJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 4 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoStrela Stealer: Today's invoice is tomorrow's phishplus-squaresecurityintelligence.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkStrela Stealer: Today's invoice is tomorrow's phishplus-squaresecurityintelligence.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoCVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wildwww.clearskysec.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wildwww.clearskysec.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoAdvertisers are pushing ad and pop-up blockers using old tricksplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkAdvertisers are pushing ad and pop-up blockers using old tricksplus-squarewww.malwarebytes.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoEvaluating Synthetic Command Attacks on Smart Voice Assistantsplus-squarearxiv.orgexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkEvaluating Synthetic Command Attacks on Smart Voice Assistantsplus-squarearxiv.orgJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square1fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · edit-210 hours agoNew PXA Stealer targets government and education sectors for sensitive informationplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNew PXA Stealer targets government and education sectors for sensitive informationplus-squareblog.talosintelligence.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · edit-210 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 10 hours agoNew Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9plus-squareblog.xlab.qianxin.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNew Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9plus-squareblog.xlab.qianxin.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 10 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · edit-212 hours agoCrimeware and financial predictions for 2025plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkCrimeware and financial predictions for 2025plus-squaresecurelist.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · edit-212 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 22 hours agoJoint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructureplus-squarewww.cisa.govexternal-linkmessage-square5fedilinkarrow-up144arrow-down10
arrow-up144arrow-down1external-linkJoint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructureplus-squarewww.cisa.govJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 22 hours agomessage-square5fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 22 hours agoNIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikelyplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkNIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikelyplus-squaretherecord.mediaJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 22 hours agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agoSecEncoder: Logs are All You Need in Securityplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSecEncoder: Logs are All You Need in Securityplus-squarearxiv.orgJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agoShrinkLocker (+Decryptor): From Friend to Foe, and Back Againplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkShrinkLocker (+Decryptor): From Friend to Foe, and Back Againplus-squarewww.bitdefender.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agoInside the DemandScience by Pure Incubation Data Breachplus-squarewww.troyhunt.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkInside the DemandScience by Pure Incubation Data Breachplus-squarewww.troyhunt.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agoHawkEye Malware: Technical Analysisplus-squareany.runexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHawkEye Malware: Technical Analysisplus-squareany.runJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agoGlobal Companies Are Unknowingly Paying North Koreans: Here’s How to Catch Themplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkGlobal Companies Are Unknowingly Paying North Koreans: Here’s How to Catch Themplus-squareunit42.paloaltonetworks.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
minus-squareJoker@sh.itjust.workstoCybersecurity@sh.itjust.works•Abusing Ubuntu 24.04 features for root privilege escalationlinkfedilinkEnglisharrow-up3·1 day agoArticle Date: September 9, 2024 linkfedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agoInternet-exposed GNSS receivers pose threat globally in 2024plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkInternet-exposed GNSS receivers pose threat globally in 2024plus-squaresecurelist.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 2 days agoChina-linked group hacked Tibetan media and university sites to distribute Cobalt Strike payloadplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkChina-linked group hacked Tibetan media and university sites to distribute Cobalt Strike payloadplus-squaretherecord.mediaJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 2 days agoThe Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threatplus-squaresecurityscorecard.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkThe Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threatplus-squaresecurityscorecard.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 2 days agoVisionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown)plus-squarelabs.watchtowr.comexternal-linkmessage-square2fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkVisionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE Unknown)plus-squarelabs.watchtowr.comJoker@sh.itjust.works to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square2fedilink
minus-squareJoker@sh.itjust.worksOPtoCybersecurity@sh.itjust.works•Massive MOVEit Vulnerability Breach: Hacker Leaks Employee Data from Amazon, McDonald's, HSBC, HP, and Potentially 1000+ Other CompanieslinkfedilinkEnglisharrow-up2·edit-23 days agoTo read another article about this check out this: https://cybernews.com/security/moveit-fallout-hackers-leak-employee-data-from-amazon-metlife/ linkfedilink
minus-squareJoker@sh.itjust.worksOPtoCybersecurity@sh.itjust.works•Massive MOVEit Vulnerability Breach: Hacker Leaks Employee Data from Amazon, McDonald's, HSBC, HP, and Potentially 1000+ Other CompanieslinkfedilinkEnglisharrow-up2·edit-23 days agoThis is new. Also, the hacker plan to release new data soon. linkfedilink
Article Date: September 9, 2024