aramova@infosec.pub · 9 hours agoDOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square8fedilinkarrow-up141arrow-down10
arrow-up141arrow-down1external-linkDOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunchplus-squaretechcrunch.comaramova@infosec.pub · 9 hours agomessage-square8fedilink
cm0002@lemmy.world · 46 minutes agoApple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkApple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 46 minutes agomessage-square0fedilink
cm0002@lemmy.world · 33 minutes agoNorth Korean Lazarus hackers infect hundreds via npm packagesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNorth Korean Lazarus hackers infect hundreds via npm packagesplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 33 minutes agomessage-square0fedilink
Soatok Dreamseeker@pawb.social · 2 hours agoOn The Insecurity of Telecom Stacks in the Wake of Salt Typhoon - Dhole Momentsplus-squaresoatok.blogexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkOn The Insecurity of Telecom Stacks in the Wake of Salt Typhoon - Dhole Momentsplus-squaresoatok.blogSoatok Dreamseeker@pawb.social · 2 hours agomessage-square0fedilink
Tea@programming.dev · 13 hours ago'Uber for nurses' exposes 86k+ medical records, PII.plus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up132arrow-down12
arrow-up130arrow-down1external-link'Uber for nurses' exposes 86k+ medical records, PII.plus-squarewww.theregister.comTea@programming.dev · 13 hours agomessage-square1fedilink
floofloof@lemmy.ca · 1 day agoGoogle researchers uncover critical security flaw in all AMD Zen processorsplus-squarewww.techspot.comexternal-linkmessage-square3fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkGoogle researchers uncover critical security flaw in all AMD Zen processorsplus-squarewww.techspot.comfloofloof@lemmy.ca · 1 day agomessage-square3fedilink
cm0002@lemmy.world · 1 day agoThe ESP32 Bluetooth Backdoor That Wasn’tplus-squarehackaday.comexternal-linkmessage-square1fedilinkarrow-up138arrow-down10
arrow-up138arrow-down1external-linkThe ESP32 Bluetooth Backdoor That Wasn’tplus-squarehackaday.comcm0002@lemmy.world · 1 day agomessage-square1fedilink
Jonathan Snyder@infosec.pub · 2 days agoSnopes Twitter got hacked. Twitter screws up the responseplus-squareinfosec.exchangeexternal-linkmessage-square10fedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkSnopes Twitter got hacked. Twitter screws up the responseplus-squareinfosec.exchangeJonathan Snyder@infosec.pub · 2 days agomessage-square10fedilink
shellsharks@infosec.pubM · 2 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 2 days agomessage-square0fedilink
Jonathan Snyder@infosec.pub · edit-22 days agoHow to Set Up Your Online Identity on Keyoxide: A Simple Guideplus-squareblog.epic-worlds.comexternal-linkmessage-square8fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkHow to Set Up Your Online Identity on Keyoxide: A Simple Guideplus-squareblog.epic-worlds.comJonathan Snyder@infosec.pub · edit-22 days agomessage-square8fedilink
Tea@programming.dev · 2 days agoSideWinder targets the maritime and nuclear sectors with an updated toolset.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkSideWinder targets the maritime and nuclear sectors with an updated toolset.plus-squaresecurelist.comTea@programming.dev · 2 days agomessage-square0fedilink
cm0002@lemmy.world · 3 days agoYouTubers extorted via copyright strikes to spread malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkYouTubers extorted via copyright strikes to spread malwareplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 3 days agomessage-square0fedilink
Fitik@fedia.io · 4 days agoHacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court orderplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court orderplus-squaretechcrunch.comFitik@fedia.io · 4 days agomessage-square0fedilink
Tea@programming.dev · edit-23 days agoUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down12
arrow-up10arrow-down1external-linkUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comTea@programming.dev · edit-23 days agomessage-square0fedilink
cm0002@lemmy.world · 4 days agoUndocumented backdoor found in Bluetooth chip used by a billion devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down12
arrow-up1-1arrow-down1external-linkUndocumented backdoor found in Bluetooth chip used by a billion devicesplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 4 days agomessage-square1fedilink
shellsharks@infosec.pubM · 5 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 5 days agomessage-square0fedilink
Tea@programming.dev · 5 days agoExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioTea@programming.dev · 5 days agomessage-square0fedilink
cm0002@lemmy.world · 5 days agoInvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationsplus-squarecybersecuritynews.comcm0002@lemmy.world · 5 days agomessage-square0fedilink
Tea@programming.dev · 6 days agoMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comTea@programming.dev · 6 days agomessage-square0fedilink
Tea@programming.dev · edit-26 days agoViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govTea@programming.dev · edit-26 days agomessage-square0fedilink