BrikoX@lemmy.zipEnglish · edit-24 hours agoOracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS serviceplus-squaredoublepulsar.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkOracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS serviceplus-squaredoublepulsar.comBrikoX@lemmy.zipEnglish · edit-24 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 hours agoOracle Still Denies Breach as Researchers Persistplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkOracle Still Denies Breach as Researchers Persistplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoGPU-Powered Evasion: Unpacking the Sophisticated CoffeeLoader Malwareplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGPU-Powered Evasion: Unpacking the Sophisticated CoffeeLoader Malwareplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 7 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoFake Zoom, Real Ransom: Nine-Day Malware Intrusion Ends with BlackSuit Ransomware Blastplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkFake Zoom, Real Ransom: Nine-Day Malware Intrusion Ends with BlackSuit Ransomware Blastplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 hours agoWas Check Point hacked? Security firm calls ransom demands old newsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWas Check Point hacked? Security firm calls ransom demands old newsplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 8 hours agoPhaaS actor uses DoH and DNS MX to dynamically distribute phishingplus-squareblogs.infoblox.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkPhaaS actor uses DoH and DNS MX to dynamically distribute phishingplus-squareblogs.infoblox.comKid@sh.itjust.worksMEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoAnalysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques - CYFIRMAwww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnalysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques - CYFIRMAwww.cyfirma.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0fedilink
cyrano@lemmy.dbzer0.comEnglish · 1 day agoPrivacy disaster as LGBTQ+ and BDSM dating apps leak private photos.plus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up156arrow-down10
arrow-up156arrow-down1external-linkPrivacy disaster as LGBTQ+ and BDSM dating apps leak private photos.plus-squarecybernews.comcyrano@lemmy.dbzer0.comEnglish · 1 day agomessage-square0fedilink
cyrano@lemmy.dbzer0.comEnglish · 2 days agoTwitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Jobplus-squarehackread.comexternal-linkmessage-square5fedilinkarrow-up1209arrow-down10
arrow-up1209arrow-down1external-linkTwitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Jobplus-squarehackread.comcyrano@lemmy.dbzer0.comEnglish · 2 days agomessage-square5fedilink
AmbiguousProps@lemmy.todayEnglish · 1 day agoNew Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentialsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentialsplus-squarethehackernews.comAmbiguousProps@lemmy.todayEnglish · 1 day agomessage-square0fedilink
Higgs boson@dubvee.orgEnglish · edit-22 days agoMAC Address Randomization in Mobile Devices and When it Failsplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkMAC Address Randomization in Mobile Devices and When it Failsplus-squarearxiv.orgHiggs boson@dubvee.orgEnglish · edit-22 days agomessage-square0fedilink
cantankerous_cashew@lemmy.worldEnglish · 4 days agoBlasting Past WebP - An analysis of the NSO BLASTPASS iMessage exploitplus-squaregoogleprojectzero.blogspot.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkBlasting Past WebP - An analysis of the NSO BLASTPASS iMessage exploitplus-squaregoogleprojectzero.blogspot.comcantankerous_cashew@lemmy.worldEnglish · 4 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoMalicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkMalicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Nemeski@lemm.eeEnglish · 7 days agoFBI warnings are true—fake file converters do push malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square5fedilinkarrow-up139arrow-down10
arrow-up139arrow-down1external-linkFBI warnings are true—fake file converters do push malwareplus-squarewww.bleepingcomputer.comNemeski@lemm.eeEnglish · 7 days agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · 4 days ago'Lucid' Phishing-as-a-Service Exploits Faults in iMessage, Android RCSplus-squarewww.darkreading.comexternal-linkmessage-square2fedilinkarrow-up19arrow-down12
arrow-up17arrow-down1external-link'Lucid' Phishing-as-a-Service Exploits Faults in iMessage, Android RCSplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoOracle customers confirm data stolen in alleged cloud breach is validplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkOracle customers confirm data stolen in alleged cloud breach is validplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoNew Windows zero-day leaks NTLM hashes, gets unofficial patchplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew Windows zero-day leaks NTLM hashes, gets unofficial patchplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoBrowser-in-the-Browser attacks target CS2 players' Steam accountsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkBrowser-in-the-Browser attacks target CS2 players' Steam accountsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 4 days agoCrushFTP CEO flames VulnCheck for assigning critical CVEplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkCrushFTP CEO flames VulnCheck for assigning critical CVEplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoFacePass security lapse exposes users' identification dataplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkFacePass security lapse exposes users' identification dataplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink