Kid@sh.itjust.worksMEnglish · 1 year agoNew Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwideplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwideplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoTransport for London confirms customer data stolen in cyberattackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTransport for London confirms customer data stolen in cyberattackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoFortinet confirms data breach after hacker claims to steal 440GB of filesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFortinet confirms data breach after hacker claims to steal 440GB of filesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoAmateurish 'CosmicBeetle' Ransomware Stings Turkish SMBsplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAmateurish 'CosmicBeetle' Ransomware Stings Turkish SMBsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
BrikoX@lemmy.zipEnglish · 1 year agoApple Vision Pro’s Eye Tracking Exposed What People Typeplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple Vision Pro’s Eye Tracking Exposed What People Typeplus-squarewww.wired.comBrikoX@lemmy.zipEnglish · 1 year agomessage-square0linkfedilink
BrikoX@lemmy.zipEnglish · 1 year agoAs quantum computing threats loom, Microsoft updates its core crypto libraryplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAs quantum computing threats loom, Microsoft updates its core crypto libraryplus-squarearstechnica.comBrikoX@lemmy.zipEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoQuad7 botnet evolves to more stealthy tactics to evade detectionplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkQuad7 botnet evolves to more stealthy tactics to evade detectionplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoNew RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDRgbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDRgbhackers.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoMicrosoft Discloses 4 Zero-Days in September Updateplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Discloses 4 Zero-Days in September Updateplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoDockerSpy: Search for images on Docker Hub, extract sensitive information - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDockerSpy: Search for images on Docker Hub, extract sensitive information - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoRogue WHOIS server gives researcher superpowers no one should ever haveplus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRogue WHOIS server gives researcher superpowers no one should ever haveplus-squarearstechnica.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
BrikoX@lemmy.zipEnglish · 1 year agoBug Left Some Windows PCs Dangerously Unpatchedplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBug Left Some Windows PCs Dangerously Unpatchedplus-squarekrebsonsecurity.comBrikoX@lemmy.zipEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoNew PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computersplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computersplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoMicrosoft to start force-upgrading Windows 22H2 systems next monthplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft to start force-upgrading Windows 22H2 systems next monthplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoPoland thwarted cyberattacks that were carried out by Russia and Belarusplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPoland thwarted cyberattacks that were carried out by Russia and Belarusplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoNew Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keysplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keysplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoThreat Actors Allegedly Claiming Leak of Capgemini Datagbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Allegedly Claiming Leak of Capgemini Datagbhackers.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoU.S. CISA adds SonicWall SonicOS, ImageMagick and Linux Kernel bugs to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkU.S. CISA adds SonicWall SonicOS, ImageMagick and Linux Kernel bugs to its Known Exploited Vulnerabilities catalogplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoPredator spyware operation is back with a new infrastructureplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPredator spyware operation is back with a new infrastructureplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 1 year agoNew RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networksplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 year agomessage-square0linkfedilink