Kid@sh.itjust.worksMEnglish · 51 minutes agoWarning over free online file converters that actually install malwareplus-squarewww.malwarebytes.comexternal-linkmessage-square3fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkWarning over free online file converters that actually install malwareplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 51 minutes agomessage-square3fedilink
PhilipTheBucket@ponder.catEnglish · 5 hours agoGitHub supply chain attack spills secrets from 23K projectsplus-squarego.theregister.comexternal-linkmessage-square6fedilinkarrow-up127arrow-down12
arrow-up125arrow-down1external-linkGitHub supply chain attack spills secrets from 23K projectsplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 5 hours agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 55 minutes agoMicrosoft: March Windows updates mistakenly uninstall Copilotplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft: March Windows updates mistakenly uninstall Copilotplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 55 minutes agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 51 minutes agoAttackers use CSS to create evasive phishing messagessecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAttackers use CSS to create evasive phishing messagessecurityaffairs.comKid@sh.itjust.worksMEnglish · 51 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 50 minutes agoWidespread Coinbase phishing attack uncoveredplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkWidespread Coinbase phishing attack uncoveredplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 50 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 52 minutes agoCISA Flags Critical Ivanti Vulnerabilities Actively Exploited In The Wildplus-squareinformationsecuritybuzz.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCISA Flags Critical Ivanti Vulnerabilities Actively Exploited In The Wildplus-squareinformationsecuritybuzz.comKid@sh.itjust.worksMEnglish · 52 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 55 minutes agoCritical RCE flaw in Apache Tomcat actively exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCritical RCE flaw in Apache Tomcat actively exploited in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 55 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoSign in as anyone: Bypassing SAML SSO authentication with parser differentialsplus-squaregithub.blogexternal-linkmessage-square1fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkSign in as anyone: Bypassing SAML SSO authentication with parser differentialsplus-squaregithub.blogKid@sh.itjust.worksMEnglish · 7 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoNew Akira ransomware decryptor cracks encryptions keys using GPUsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkNew Akira ransomware decryptor cracks encryptions keys using GPUsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square1fedilink
Tea@programming.devEnglish · 1 hour agoStilachiRAT analysis: From system reconnaissance to cryptocurrency theft.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStilachiRAT analysis: From system reconnaissance to cryptocurrency theft.plus-squarewww.microsoft.comTea@programming.devEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoPay, fight, or stall? The dilemma of ransomware negotiations - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square6fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkPay, fight, or stall? The dilemma of ransomware negotiations - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoNew Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Supportplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNew Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Supportplus-squarehackread.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoCVE-2025–24813: Apache Tomcat Path Equivalence Vulnerabilityinfosecwriteups.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCVE-2025–24813: Apache Tomcat Path Equivalence Vulnerabilityinfosecwriteups.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoFraudsters Impersonate Clop Ransomware to Extort Businessesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFraudsters Impersonate Clop Ransomware to Extort Businessesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoErickson Companies Notifies Victims of Recent Data Breach Leaking Their SSNs | JD Supraplus-squarewww.jdsupra.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkErickson Companies Notifies Victims of Recent Data Breach Leaking Their SSNs | JD Supraplus-squarewww.jdsupra.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0fedilink
leds@feddit.dkEnglish · 2 days agopopular github action compromisedplus-squarewww.stepsecurity.ioexternal-linkmessage-square0fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkpopular github action compromisedplus-squarewww.stepsecurity.ioleds@feddit.dkEnglish · 2 days agomessage-square0fedilink
Tea@programming.devEnglish · 2 days ago[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.plus-squarewww.bentasker.co.ukexternal-linkmessage-square1fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-link[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.plus-squarewww.bentasker.co.ukTea@programming.devEnglish · 2 days agomessage-square1fedilink
thatonecoderEnglish · 2 days agoQuestions about Argon2id and authentication handling overallplus-squaremessage-squaremessage-square3fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareQuestions about Argon2id and authentication handling overallplus-squarethatonecoderEnglish · 2 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 3 days ago94% of Wi-Fi networks lack protection against deauthentication attacks - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square8fedilinkarrow-up156arrow-down11
arrow-up155arrow-down1external-link94% of Wi-Fi networks lack protection against deauthentication attacks - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square8fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCar Exploit Allows You to Spy on Drivers in Real Timeplus-squarewww.darkreading.comexternal-linkmessage-square3fedilinkarrow-up122arrow-down15
arrow-up117arrow-down1external-linkCar Exploit Allows You to Spy on Drivers in Real Timeplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square3fedilink