BrikoX@lemmy.zipEnglish · edit-21 month agoASUS releases fix for AMI bug that lets hackers brick serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkASUS releases fix for AMI bug that lets hackers brick serversplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-21 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoRipple’s recommended XRP library xrpl.js hacked to steal walletsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRipple’s recommended XRP library xrpl.js hacked to steal walletsplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
Amoxtli@thelemmy.clubEnglish · 1 month agoTexas city takes systems offline after cyberattackplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTexas city takes systems offline after cyberattackplus-squaretherecord.mediaAmoxtli@thelemmy.clubEnglish · 1 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-21 month agoBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 stepsplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · edit-21 month agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 1 month agoMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft rated this bug as low exploitability. Miscreants weaponized it in just 8 daysplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · 1 month agomessage-square0fedilink
NinjaZ@infosec.pubEnglish · 1 month agoThe Web is Brokenplus-squarejan.wildeboer.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Web is Brokenplus-squarejan.wildeboer.netNinjaZ@infosec.pubEnglish · 1 month agomessage-square0fedilink
ByteOnBikes@slrpnk.netEnglish · 2 months agoHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow I Got Hacked: A Warning about Malicious PoCsplus-squarechocapikk.comByteOnBikes@slrpnk.netEnglish · 2 months agomessage-square0fedilink
vf2000@lemmy.zipEnglish · 2 months agoEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEUVD: Vulnerability Database operated by ENISA (beta)plus-squareeuvd.enisa.europa.euvf2000@lemmy.zipEnglish · 2 months agomessage-square0fedilink
recursive_recursion they/them@lemmy.caEnglish · edit-22 months agoInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageInsecure Code vs. the Entire RGB Industry | WinRing 0 Driver, ft. Wendell of Level1 Techsplus-squarei.ytimg.comrecursive_recursion they/them@lemmy.caEnglish · edit-22 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Groups Exploit NTLM Flaw in Microsoft Windowsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Flags Actively Exploited Vulnerability in SonicWall SMA Devicesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrazyHunter Campaign Targets Taiwanese Critical Sectorsplus-squarewww.trendmicro.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew macOS Spyware PasivRobber Linked to Chinese State Actorsplus-squarecyberinsider.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Toolsplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 16,000 Fortinet devices compromised with symlink backdoorplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA warns of potential data breaches caused by legacy Oracle Cloud leakplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRansomware Group Claims Hacking of Oregon Regulator After Data Breach Denialplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHuge ransomware campaign targets AWS S3 storage: attackers have thousands of keysplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
cm0002@lemmy.worldEnglish · 2 months agoVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerabilities in the SS7 phone system can allow attackers to steal your calls and texts, track your locationplus-squarewww.youtube.comcm0002@lemmy.worldEnglish · 2 months agomessage-square0fedilink
cm0002@lemmy.worldEnglish · 2 months agoGCVE: Global CVE Allocation Systemplus-squaregcve.euexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGCVE: Global CVE Allocation Systemplus-squaregcve.eucm0002@lemmy.worldEnglish · 2 months agomessage-square0fedilink