JaromilAEnglish · 15 days agoThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comJaromilAEnglish · 15 days agomessage-square0fedilink
JaromilAEnglish · 27 days agoBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comJaromilAEnglish · 27 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCritical Kubernetes Image Builder flaw gives SSH root access to VMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Kubernetes Image Builder flaw gives SSH root access to VMsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
AmbiguousProps@lemmy.todayEnglish · 2 months agoCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerabilityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerabilityplus-squarethehackernews.comAmbiguousProps@lemmy.todayEnglish · 2 months agomessage-square0fedilink
AmbiguousProps@lemmy.todayEnglish · 2 months agoGitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Accessplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Accessplus-squarethehackernews.comAmbiguousProps@lemmy.todayEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-22 months agoNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-22 months agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 2 months agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink