BrikoX@lemmy.zipEnglish · 5 hours agoMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up152arrow-down10
arrow-up152arrow-down1external-linkMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · 5 hours agomessage-square1linkfedilink
Amoxtli@thelemmy.clubEnglish · 3 hours agoTexas city takes systems offline after cyberattackplus-squaretherecord.mediaexternal-linkmessage-square1linkfedilinkarrow-up124arrow-down11
arrow-up123arrow-down1external-linkTexas city takes systems offline after cyberattackplus-squaretherecord.mediaAmoxtli@thelemmy.clubEnglish · 3 hours agomessage-square1linkfedilink
BrikoX@lemmy.zipEnglish · edit-23 hours agoBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · edit-23 hours agomessage-square0linkfedilink
NinjaZ@infosec.pubEnglish · 2 days agoThe Web is Brokenplus-squarejan.wildeboer.netexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Web is Brokenplus-squarejan.wildeboer.netNinjaZ@infosec.pubEnglish · 2 days agomessage-square0linkfedilink
vf2000@lemmy.zipEnglish · 4 days agoEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euvf2000@lemmy.zipEnglish · 4 days agomessage-square0linkfedilink
ByteOnBikes@slrpnk.netEnglish · 4 days agoHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comexternal-linkmessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comByteOnBikes@slrpnk.netEnglish · 4 days agomessage-square1linkfedilink
recursive_recursion they/them@lemmy.caEnglish · edit-24 days agoInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comimagemessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1imageInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comrecursive_recursion they/them@lemmy.caEnglish · edit-24 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
cm0002@lemmy.worldEnglish · 5 days agoVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comcm0002@lemmy.worldEnglish · 5 days agomessage-square0linkfedilink
cm0002@lemmy.worldEnglish · 5 days agoGCVE: Global CVE Allocation Systemplus-squaregcve.euexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGCVE: Global CVE Allocation Systemplus-squaregcve.eucm0002@lemmy.worldEnglish · 5 days agomessage-square0linkfedilink
PhilipTheBucket@ponder.catEnglish · 6 days agoCVE program gets a last-minute save, maybe a new homeplus-squarego.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE program gets a last-minute save, maybe a new homeplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 6 days agomessage-square0linkfedilink
PhilipTheBucket@ponder.catEnglish · edit-26 days agoThe CVE program for tracking security flaws is about to lose federal fundingplus-squarewww.theverge.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe CVE program for tracking security flaws is about to lose federal fundingplus-squarewww.theverge.comPhilipTheBucket@ponder.catEnglish · edit-26 days agomessage-square0linkfedilink