Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoFIN6 hackers pose as job seekers to backdoor recruiters’ devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFIN6 hackers pose as job seekers to backdoor recruiters’ devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoRust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Usersplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Usersplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoCritical Vulnerability Patched in SAP NetWeaver - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Vulnerability Patched in SAP NetWeaver - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoRare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprisesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprisesplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoMassive Heroku outage impacts web platforms worldwideplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMassive Heroku outage impacts web platforms worldwideplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoCISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalogplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalogplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoNew Zealand Government Mandates DMARC Under New Secure Email Framework - Security Boulevardplus-squaresecurityboulevard.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Zealand Government Mandates DMARC Under New Secure Email Framework - Security Boulevardplus-squaresecurityboulevard.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoPayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoNearly 300,000 crash records stolen from Texas transportation department | The Record from Recorded Future Newsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNearly 300,000 crash records stolen from Texas transportation department | The Record from Recorded Future Newsplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoResecurity | APT 41: Threat Intelligence Report and Malware Analysisplus-squarewww.resecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResecurity | APT 41: Threat Intelligence Report and Malware Analysisplus-squarewww.resecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoCYFIRMA INDUSTRY REPORT – ENERGY & UTILITIES - CYFIRMAplus-squarewww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCYFIRMA INDUSTRY REPORT – ENERGY & UTILITIES - CYFIRMAplus-squarewww.cyfirma.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoTwo Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability | Akamaiwww.akamai.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTwo Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability | Akamaiwww.akamai.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoHidden Backdoors in npm Packages Let Attackers Wipe Entire Systemsplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHidden Backdoors in npm Packages Let Attackers Wipe Entire Systemsplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoGoogle Vulnerability Allowed Hackers to Access User Phone Numbersplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Vulnerability Allowed Hackers to Access User Phone Numbersplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoSensata Technologies says personal data stolen by ransomware gangplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSensata Technologies says personal data stolen by ransomware gangplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoSentinelOne shares new details on China-linked breach attemptplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSentinelOne shares new details on China-linked breach attemptplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoGrocery wholesale giant United Natural Foods hit by cyberattackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGrocery wholesale giant United Natural Foods hit by cyberattackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoJenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protectionplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protectionplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoBadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warnsplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warnsplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoNew Salesforce SOQL Injection 0-Day Vulnerability Exposes Millions of Deploymentsplus-squarecyberpress.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Salesforce SOQL Injection 0-Day Vulnerability Exposes Millions of Deploymentsplus-squarecyberpress.orgKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink