Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 days agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 days agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 days agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 22 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agoThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agoNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agoMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agoCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agoFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agoWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 25 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agoThe Top 10 Countries Most Targeted by Cyberattacksplus-squareblogs.blackberry.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Top 10 Countries Most Targeted by Cyberattacksplus-squareblogs.blackberry.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agoHackers Hide Remcos RAT in GitHub Repository Commentsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Hide Remcos RAT in GitHub Repository Commentsplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agoMultiple VMware NSX Vulnerabilities Let Attackers Gain Root Accessplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple VMware NSX Vulnerabilities Let Attackers Gain Root Accessplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agoCISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patchesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patchesplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agoInternet Archive hacked, data breach impacts 31 million usersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInternet Archive hacked, data breach impacts 31 million usersplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 26 days agomessage-square0fedilink