Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agoHalliburton reports $35 million loss after ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHalliburton reports $35 million loss after ransomware attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agoTor Network Thwarts IP Spoofing Attackplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTor Network Thwarts IP Spoofing Attackplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agoPolice Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Outplus-squarewww.404media.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPolice Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Outplus-squarewww.404media.coKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agoHackers Use Excel Files to Deliver Remcos RAT Variant on Windowsplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Use Excel Files to Deliver Remcos RAT Variant on Windowsplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoGodFather Malware Now Targets 500+ Banking and Crypto Appsplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGodFather Malware Now Targets 500+ Banking and Crypto Appsplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoCISA warns of critical Palo Alto Networks bug exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA warns of critical Palo Alto Networks bug exploited in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoTexas-based oilfield supplier faces disruptions following ransomware attackplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTexas-based oilfield supplier faces disruptions following ransomware attackplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoInterlock Ransomware Targets US Healthcare, IT and Government Sectorsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInterlock Ransomware Targets US Healthcare, IT and Government Sectorsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoEvasive ZIP Concatenation: Trojan Targets Windows Usersplus-squareperception-point.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEvasive ZIP Concatenation: Trojan Targets Windows Usersplus-squareperception-point.ioKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoMalicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developersplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developersplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoVEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malwareplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malwareplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoCisco Identity Services Engine Flaw Bypass Authorization Mechanismsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco Identity Services Engine Flaw Bypass Authorization Mechanismsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoNorth Korean hackers use new macOS malware against crypto firmsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean hackers use new macOS malware against crypto firmsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers increasingly use Winos4.0 post-exploitation kit in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoResearcher Discloses 36 Vulnerabilities Found in IBM Security Verify Accessplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearcher Discloses 36 Vulnerabilities Found in IBM Security Verify Accessplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid Botnet ToxicPanda Bashes Banks Across Europe, LatAmplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attackplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packagesplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid flaw may be under limited, targeted exploitationplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agoCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrooks bank on Microsoft's search engine to phish customersplus-squarewww.malwarebytes.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink