JaromilAEnglish · 1 year agoThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comJaromilAEnglish · 1 year agomessage-square0linkfedilink
JaromilAEnglish · 1 year agoBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comJaromilAEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoCritical Kubernetes Image Builder flaw gives SSH root access to VMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Kubernetes Image Builder flaw gives SSH root access to VMsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
AmbiguousProps@lemmy.todayEnglish · 1 year agoCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerabilityplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerabilityplus-squarethehackernews.comAmbiguousProps@lemmy.todayEnglish · 1 year agomessage-square0linkfedilink
AmbiguousProps@lemmy.todayEnglish · 1 year agoGitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Accessplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Accessplus-squarethehackernews.comAmbiguousProps@lemmy.todayEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
BrikoX@lemmy.zipEnglish · 1 year agoNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew FASTCash malware Linux variant helps steal money from ATMsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 1 year agomessage-square0linkfedilink
BrikoX@lemmy.zipEnglish · 1 year agoChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese researchers break RSA encryption with a quantum computerplus-squarewww.csoonline.comBrikoX@lemmy.zipEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink