Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoOver 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attackplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkOver 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attackplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoAndroid devices track you before you even sign inplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkAndroid devices track you before you even sign inplus-squarewww.malwarebytes.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoDefending against EDR bypass attacks - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkDefending against EDR bypass attacks - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoNIST selects HQC as backup algorithm for post-quantum encryption - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkNIST selects HQC as backup algorithm for post-quantum encryption - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoChinese Cyber Espionage Group UNC3886 Backdoored Juniper Routersplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkChinese Cyber Espionage Group UNC3886 Backdoored Juniper Routersplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoNVIDIA Addresses Security Vulnerabilities in NVIDIA Riva with Software Updateplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkNVIDIA Addresses Security Vulnerabilities in NVIDIA Riva with Software Updateplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agoMozilla warns users to update Firefox before certificate expiresplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkMozilla warns users to update Firefox before certificate expiresplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoApple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkApple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacksplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoBlind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkBlind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacksplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoNorth Korean Lazarus hackers infect hundreds via npm packagesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkNorth Korean Lazarus hackers infect hundreds via npm packagesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoNorth Korean Lazarus hackers infect hundreds via npm packagesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkNorth Korean Lazarus hackers infect hundreds via npm packagesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoCritical PHP RCE vulnerability mass exploited in new attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCritical PHP RCE vulnerability mass exploited in new attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoMicrosoft March 2025 Patch Tuesday fixes 7 zero-days, 57 flawsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkMicrosoft March 2025 Patch Tuesday fixes 7 zero-days, 57 flawsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoPreviously unidentified botnet infects unpatched TP-Link Archer home routersplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkPreviously unidentified botnet infects unpatched TP-Link Archer home routersplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agoUK Government Report Calls for Stronger Open Source Supply Chain Security Practicesplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkUK Government Report Calls for Stronger Open Source Supply Chain Security Practicesplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 9 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agoSilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Toolsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Toolsplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agoUndocumented hidden feature found in Espressif ESP32 microchipplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkUndocumented hidden feature found in Espressif ESP32 microchipplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agoUndocumented hidden feature found in Espressif ESP32 microchipplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkUndocumented hidden feature found in Espressif ESP32 microchipplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agoCobalt Strike Exploitation by Hackers Drops, Report Revealsplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkCobalt Strike Exploitation by Hackers Drops, Report Revealsplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agoNew Chirp tool uses audio tones to transfer data between devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkNew Chirp tool uses audio tones to transfer data between devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 days agomessage-square0fedilink