Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoCritical Kubernetes Image Builder flaw gives SSH root access to VMsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Kubernetes Image Builder flaw gives SSH root access to VMsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVolkswagen Says IT Infrastructure Not Affected After Ransomware Gang Claims Data Theftplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPennsylvania food bank claimed as latest ransomware victimplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns Actively Exploited Vulnerabilities, Including Windows Kernel Flaw and Firefox Zero-Dayplus-squarewww.cisa.govKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months ago87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link87,000+ Fortinet devices still open to attackplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEDRSilencer: The Red Team Tool Turned Cybercriminal Weaponplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Stolen Data on Unannounced Games as Well as Nintendo Switch 2 Codename Leaked Onlineplus-squarewww.ign.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCommand-jacking used to launch malicious code on open-source platformsplus-squarewww.scworld.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfusedPilot Attack Can Manipulate RAG-Based AI Systemsplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers now exploit Windows flaw to elevate privilegesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actor ProKYC Selling Tools To Bypass Two-Factor Authenticationplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Windows Feature Limits Admin Privilegesplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Vulnerabilities Found in SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Clientplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of F5 BIG-IP Cookie Exploitationplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFidelity Notifies 77K Customers of Data Breachplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agoWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows 11's big 2024 update leaves behind ~9GB of undeletable filesplus-squarewww.pcworld.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months agomessage-square0linkfedilink