Pro@programming.dev · 12 minutes agoSame Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwordsplus-squarecitizenlab.caexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSame Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwordsplus-squarecitizenlab.caPro@programming.dev · 12 minutes agomessage-square0linkfedilink
cm0002@lemmy.world · 13 hours agoNorth Korean hackers deepfake execs in Zoom call to spread Mac malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2linkfedilinkarrow-up136arrow-down10
arrow-up136arrow-down1external-linkNorth Korean hackers deepfake execs in Zoom call to spread Mac malwareplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 13 hours agomessage-square2linkfedilink
cm0002@lemmy.world · 13 hours agoNew Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chainsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNew Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chainsplus-squarethehackernews.comcm0002@lemmy.world · 13 hours agomessage-square0linkfedilink
shellsharks@infosec.pubM · 19 hours agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 19 hours agomessage-square0linkfedilink
cm0002@lemmy.world · 2 days agoMDEAutomator: Open-source endpoint management, incident response in MDEplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMDEAutomator: Open-source endpoint management, incident response in MDEplus-squarewww.helpnetsecurity.comcm0002@lemmy.world · 2 days agomessage-square0linkfedilink
cm0002@lemmy.world · 2 days agoThreat Actor Abuses TeamFiltration for Entra ID Account Takeoversplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkThreat Actor Abuses TeamFiltration for Entra ID Account Takeoversplus-squarewww.darkreading.comcm0002@lemmy.world · 2 days agomessage-square0linkfedilink
Pro@programming.dev · 1 day agoA look at ‘Tinker,’ Black Basta’s phishing fixer, negotiatorintel471.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkA look at ‘Tinker,’ Black Basta’s phishing fixer, negotiatorintel471.comPro@programming.dev · 1 day agomessage-square0linkfedilink
randomname@scribe.disroot.org · 2 days agoTwo Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and moneyplus-squarewww.lighthousereports.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkTwo Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and moneyplus-squarewww.lighthousereports.comrandomname@scribe.disroot.org · 2 days agomessage-square1linkfedilink
Hotznplotzn@lemmy.sdf.org · 3 days agoApple and Google Still Have a Chinese VPN Problemplus-squarewww.techtransparencyproject.orgexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down13
arrow-up15arrow-down1external-linkApple and Google Still Have a Chinese VPN Problemplus-squarewww.techtransparencyproject.orgHotznplotzn@lemmy.sdf.org · 3 days agomessage-square0linkfedilink
SayCyberOnceMore@feddit.uk · 4 days agoSolar PV vulnerabilitiesplus-squarewww.redhotcyber.comexternal-linkmessage-square3linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkSolar PV vulnerabilitiesplus-squarewww.redhotcyber.comSayCyberOnceMore@feddit.uk · 4 days agomessage-square3linkfedilink
cm0002@lemmy.world · 2 days agoHackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Recordsplus-squarecybersecuritynews.comexternal-linkmessage-square5linkfedilinkarrow-up18arrow-down19
arrow-up1-1arrow-down1external-linkHackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Recordsplus-squarecybersecuritynews.comcm0002@lemmy.world · 2 days agomessage-square5linkfedilink
Pro@programming.dev · 3 days agoA JPEG With A Payloadplus-squareisc.sans.eduexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkA JPEG With A Payloadplus-squareisc.sans.eduPro@programming.dev · 3 days agomessage-square0linkfedilink
cm0002@lemmy.world · 4 days agoWindows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attackplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkWindows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attackplus-squarecybersecuritynews.comcm0002@lemmy.world · 4 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 3 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square3linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 3 days agomessage-square3linkfedilink
cm0002@lemmy.world · 6 days agoGCVE-BCP-03 - Decentralized Publication Standard implemented in Vulnerability-Lookupplus-squaremessage-squaremessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareGCVE-BCP-03 - Decentralized Publication Standard implemented in Vulnerability-Lookupplus-squarecm0002@lemmy.world · 6 days agomessage-square0linkfedilink
Pro@programming.dev · 7 days agoFrom Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Deliveryplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkFrom Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Deliveryplus-squareresearch.checkpoint.comPro@programming.dev · 7 days agomessage-square0linkfedilink
Pro@programming.dev · 7 days agoGraphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targetedplus-squarecitizenlab.caexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10cross-posted to: [email protected]
arrow-up112arrow-down1external-linkGraphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targetedplus-squarecitizenlab.caPro@programming.dev · 7 days agomessage-square0linkfedilinkcross-posted to: [email protected]
Pro@programming.dev · 6 days agoRansomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Providerplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkRansomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Providerplus-squarewww.cisa.govPro@programming.dev · 6 days agomessage-square0linkfedilink
randomname@scribe.disroot.org · 7 days agoRussian hybrid warfare: Ukraine's success offers lessons for Europeplus-squarewww.atlanticcouncil.orgexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkRussian hybrid warfare: Ukraine's success offers lessons for Europeplus-squarewww.atlanticcouncil.orgrandomname@scribe.disroot.org · 7 days agomessage-square0linkfedilink