Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agoUK Software Firm Exposed 1.1TB of Healthcare Worker Recordsplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUK Software Firm Exposed 1.1TB of Healthcare Worker Recordsplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agoWindows 11 Escalation Vulnerability Let Attackers Gain Admin Access Within 300 Millisecondsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows 11 Escalation Vulnerability Let Attackers Gain Admin Access Within 300 Millisecondsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agoOracle Security Update - Patch for 378 Vulnerabilities Including Remote Exploitsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOracle Security Update - Patch for 378 Vulnerabilities Including Remote Exploitsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoRenewed APT29 Phishing Campaign Against European Diplomats - Check Point Researchplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRenewed APT29 Phishing Campaign Against European Diplomats - Check Point Researchplus-squareresearch.checkpoint.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoMajority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Findsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMajority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Findsplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoChinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Toolplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Toolplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoGoogle adds Android auto-reboot to block forensic data extractionsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle adds Android auto-reboot to block forensic data extractionsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoFortinet Zero-Day Bug May Lead to Arbitrary Code Executionplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFortinet Zero-Day Bug May Lead to Arbitrary Code Executionplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoPossible Russian Hackers Targeted UK Ministry of Defenseplus-squarewww.bankinfosecurity.inexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPossible Russian Hackers Targeted UK Ministry of Defenseplus-squarewww.bankinfosecurity.inKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoHackers Leveraging Teams Messages to Execute Malware on Windows Systemsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Leveraging Teams Messages to Execute Malware on Windows Systemsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoNew Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defensesplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defensesplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0linkfedilink