Kid@sh.itjust.worksMEnglish · 2 minutes agoAI transforms cybercrime: researchers warn about the rise of AI agent hackersplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAI transforms cybercrime: researchers warn about the rise of AI agent hackersplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 2 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 33 minutes agoGoogle fixes high severity Chrome flaw with public exploitplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle fixes high severity Chrome flaw with public exploitplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 33 minutes agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 11 minutes agoHTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systemsplus-squarecyberpress.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systemsplus-squarecyberpress.orgKid@sh.itjust.worksMEnglish · 11 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 hour agoRansomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Saysplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkRansomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Saysplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 hour agoGoogle says hackers behind UK retail cyber campaign now also targeting USplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle says hackers behind UK retail cyber campaign now also targeting USplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 hour agoCybersecurity incident forces largest US steelmaker to take some operations offlineplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybersecurity incident forces largest US steelmaker to take some operations offlineplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTwilio denies breach following leak of alleged Steam 2FA codesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkTwilio denies breach following leak of alleged Steam 2FA codesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoEuropean Vulnerability Database Launches Amid US CVE Chaosplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square6fedilinkarrow-up165arrow-down11
arrow-up164arrow-down1external-linkEuropean Vulnerability Database Launches Amid US CVE Chaosplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoMicrosoft Defender Vulnerability Allows Attackers to Elevate Privilegesplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkMicrosoft Defender Vulnerability Allows Attackers to Elevate Privilegesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoRansomware gangs join ongoing SAP NetWeaver attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkRansomware gangs join ongoing SAP NetWeaver attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Nemeski@lemm.eeEnglish · 1 day agoAs US vuln-tracking falters, EU enters with its own security bug databaseplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up146arrow-down11
arrow-up145arrow-down1external-linkAs US vuln-tracking falters, EU enters with its own security bug databaseplus-squarewww.theregister.comNemeski@lemm.eeEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCybercriminals Hide Undetectable Ransomware Inside JPG Imagesgbhackers.comexternal-linkmessage-square8fedilinkarrow-up134arrow-down11
arrow-up133arrow-down1external-linkCybercriminals Hide Undetectable Ransomware Inside JPG Imagesgbhackers.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square8fedilink
floofloof@lemmy.caEnglish · 22 hours agoInsight: Rogue communication devices found in Chinese solar power invertersplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkInsight: Rogue communication devices found in Chinese solar power invertersplus-squarewww.reuters.comfloofloof@lemmy.caEnglish · 22 hours agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 24 hours agoChina-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabiaplus-squareblog.eclecticiq.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkChina-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabiaplus-squareblog.eclecticiq.comHotznplotzn@lemmy.sdf.orgEnglish · 24 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoSAP patches second zero-day flaw exploited in recent attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkSAP patches second zero-day flaw exploited in recent attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoHorabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emailsplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHorabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emailsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoHackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwordsplus-squarecybersecuritynews.comexternal-linkmessage-square4fedilinkarrow-up113arrow-down112
arrow-up11arrow-down1external-linkHackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwordsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square4fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoAustralian Human Rights Commission Data Breach Exposes Sensitive Documents Submitted via Websiteplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAustralian Human Rights Commission Data Breach Exposes Sensitive Documents Submitted via Websiteplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew Intel CPU flaws leak sensitive data from privileged memoryplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkNew Intel CPU flaws leak sensitive data from privileged memoryplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoA Subtle Form of Siege: DDoS Smokescreens as a Cover for Quiet Data Breachesplus-squarewww.tripwire.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkA Subtle Form of Siege: DDoS Smokescreens as a Cover for Quiet Data Breachesplus-squarewww.tripwire.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink