Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoChipmaker Patch Tuesday: Intel Publishes 44 and AMD Publishes 8 New Advisorieswww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkChipmaker Patch Tuesday: Intel Publishes 44 and AMD Publishes 8 New Advisorieswww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoHive0145 Targets Europe with Advanced Strela Stealer Campaignsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHive0145 Targets Europe with Advanced Strela Stealer Campaignsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoEmbargo ransomware claims breach of US pharmacy networkplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEmbargo ransomware claims breach of US pharmacy networkplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoRussian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emailsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkRussian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emailsplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoLeaked info of 122 million linked to B2B data aggregator breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkLeaked info of 122 million linked to B2B data aggregator breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 hours agoZoom addressed two high-severity issues in its platformplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkZoom addressed two high-severity issues in its platformplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 hours agoNew ShrinkLocker ransomware decryptor recovers BitLocker passwordplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew ShrinkLocker ransomware decryptor recovers BitLocker passwordplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoIranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkIranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacksplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoEmmenhtal Loader Uses Scripts to Deliver Lumma and Other Malwareplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEmmenhtal Loader Uses Scripts to Deliver Lumma and Other Malwareplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNorth Korean hackers create Flutter apps to bypass macOS securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNorth Korean hackers create Flutter apps to bypass macOS securityplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoCitrix Zero-Day Bug Allows Unauthenticated RCEplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkCitrix Zero-Day Bug Allows Unauthenticated RCEplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoMicrosoft November 2024 Patch Tuesday fixes 4 zero-days, 91 flawsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkMicrosoft November 2024 Patch Tuesday fixes 4 zero-days, 91 flawsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoNew GitLoker-Linked GoIssue Tool Targets GitHub Users for Phishingplus-squarehackread.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNew GitLoker-Linked GoIssue Tool Targets GitHub Users for Phishingplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoNew Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkNew Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networksplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoMicrosoft Bookings Flaw Enables Account Hijacking and Impersonationplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft Bookings Flaw Enables Account Hijacking and Impersonationplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoHIBP notifies 57 million people of Hot Topic data breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkHIBP notifies 57 million people of Hot Topic data breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoMicrosoft Visio Files Used in Sophisticated Phishing Attacksplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMicrosoft Visio Files Used in Sophisticated Phishing Attacksplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoHalliburton reports $35 million loss after ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square8fedilinkarrow-up181arrow-down11
arrow-up180arrow-down1external-linkHalliburton reports $35 million loss after ransomware attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square8fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoTor Network Thwarts IP Spoofing Attackplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up128arrow-down10
arrow-up128arrow-down1external-linkTor Network Thwarts IP Spoofing Attackplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoPolice Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Outplus-squarewww.404media.coexternal-linkmessage-square19fedilinkarrow-up155arrow-down10
arrow-up155arrow-down1external-linkPolice Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Outplus-squarewww.404media.coKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square19fedilink