TuxBot@infosec.pubMBEnglish · 16 minutes agoAvoid Scams After Disaster Strikesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAvoid Scams After Disaster Strikesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 16 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 38 minutes agoJetpack fixes critical information disclosure flaw existing since 2016plus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJetpack fixes critical information disclosure flaw existing since 2016plus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 38 minutes agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 2 hours agoLazarus Group Deploys Linux FASTCash Malware to Steal Millions in Coordinated ATM Attacks | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkLazarus Group Deploys Linux FASTCash Malware to Steal Millions in Coordinated ATM Attacks | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comsv1sjp@lemmy.worldMEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoHuntStand - 2,795,947 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHuntStand - 2,795,947 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoCVE-2024-6197 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1strplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-6197 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1strplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoSilent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutionsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSilent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutionsplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 4 hours agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaresocial.skynetcloud.siteexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaresocial.skynetcloud.sitesv1sjp@lemmy.worldMEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoWhy Do Criminals Love Phishing-as-a-Service Platforms?plus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhy Do Criminals Love Phishing-as-a-Service Platforms?plus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 4 hours agoLow-Level Development on Retail Android Hardware - Reconnaissance and Prototyping a Bootloaderplus-squareblog.timschumi.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLow-Level Development on Retail Android Hardware - Reconnaissance and Prototyping a Bootloaderplus-squareblog.timschumi.netsv1sjp@lemmy.worldMEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 10 hours agoCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coexternal-linkmessage-square1fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 10 hours agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoFinding a needle in a haystack: Machine learning at the forefront of threat hunting researchplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkFinding a needle in a haystack: Machine learning at the forefront of threat hunting researchplus-squaresecurelist.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoFile hosting services misused for identity phishingplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkFile hosting services misused for identity phishingplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoGameVN - 1,369,485 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkGameVN - 1,369,485 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square0fedilink