Hotznplotzn@lemmy.sdf.orgEnglish · 58 minutes agoChinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report saysplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkChinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report saysplus-squaregbhackers.comHotznplotzn@lemmy.sdf.orgEnglish · 58 minutes agomessage-square0linkfedilink
BrikoX@lemmy.zipEnglish · edit-28 hours agoKrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoSplus-squarekrebsonsecurity.comexternal-linkmessage-square3linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkKrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoSplus-squarekrebsonsecurity.comBrikoX@lemmy.zipEnglish · edit-28 hours agomessage-square3linkfedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoHacker who breached communications app used by Trump aide stole data from across US governmentplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkHacker who breached communications app used by Trump aide stole data from across US governmentplus-squarewww.reuters.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoPandas Galore: Chinese Hackers Boost Attacks in Latin Americaplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkPandas Galore: Chinese Hackers Boost Attacks in Latin Americaplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0linkfedilink
floofloof@lemmy.caEnglish · 13 hours ago“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recallplus-squarearstechnica.comexternal-linkmessage-square5linkfedilinkarrow-up168arrow-down10
arrow-up168arrow-down1external-link“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recallplus-squarearstechnica.comfloofloof@lemmy.caEnglish · 13 hours agomessage-square5linkfedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoRussian hackers breach orgs to track aid routes to Ukraineplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkRussian hackers breach orgs to track aid routes to Ukraineplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoUnpatched Windows Server Flaw Threatens Active Directory Usersplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkUnpatched Windows Server Flaw Threatens Active Directory Usersplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0linkfedilink
deinu@sh.itjust.worksEnglish · 2 days agoEU High Level Group (established by EU commission) recommends forcing all devices in the EU to be sold with ”integrated Law Enforcement access” and sanctioning non-EU approved messaging servicesplus-squarehome-affairs.ec.europa.euexternal-linkmessage-square5linkfedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkEU High Level Group (established by EU commission) recommends forcing all devices in the EU to be sold with ”integrated Law Enforcement access” and sanctioning non-EU approved messaging servicesplus-squarehome-affairs.ec.europa.eudeinu@sh.itjust.worksEnglish · 2 days agomessage-square5linkfedilink
Pro@programming.devEnglish · edit-223 hours agoThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkThe US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.plus-squarewww.cisa.govPro@programming.devEnglish · edit-223 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 22 hours agoLumma infostealer malware operation disrupted, 2,300 domains seizedplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkLumma infostealer malware operation disrupted, 2,300 domains seizedplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 22 hours agomessage-square0linkfedilink
Pro@programming.devEnglish · 24 hours agoThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govPro@programming.devEnglish · 24 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoDDoSecrets Adds 410GB of TeleMessage Breach Data to Indexplus-squarehackread.comexternal-linkmessage-square2linkfedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkDDoSecrets Adds 410GB of TeleMessage Breach Data to Indexplus-squarehackread.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNATO-Flagged Vulnerability Tops Latest VMware Security Patch Batchplus-squarewww.securityweek.comexternal-linkmessage-square1linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkNATO-Flagged Vulnerability Tops Latest VMware Security Patch Batchplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoSK Telecom says malware breach lasted 3 years, impacted 27 million numbersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkSK Telecom says malware breach lasted 3 years, impacted 27 million numbersplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Pro@programming.devEnglish · 2 days agoThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Websiteplus-squareresearch.checkpoint.comPro@programming.devEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoService desks are under attack: What can you do about it?plus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkService desks are under attack: What can you do about it?plus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew Nitrogen Ransomware Targets Financial Firms in the US, UK and Canadaplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkNew Nitrogen Ransomware Targets Financial Firms in the US, UK and Canadaplus-squarehackread.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoGo-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuseplus-squarethehackernews.comexternal-linkmessage-square2linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkGo-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuseplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoWindows 10 emergency updates fix BitLocker recovery issuesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkWindows 10 emergency updates fix BitLocker recovery issuesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoLockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paidplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkLockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paidplus-squarehackread.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink