cm0002@lemmy.cafe · 20 hours agoMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comexternal-linkmessage-square1linkfedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkMalware peddlers are now hijacking Snap publisher domainsplus-squareblog.popey.comcm0002@lemmy.cafe · 20 hours agomessage-square1linkfedilink
cm0002@infosec.pub · 3 days agoA 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zeroplus-squareprojectzero.googleexternal-linkmessage-square5linkfedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkA 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zeroplus-squareprojectzero.googlecm0002@infosec.pub · 3 days agomessage-square5linkfedilink
shellsharks@infosec.pubM · 4 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 4 days agomessage-square0linkfedilink
Tony Bark@pawb.social · 6 days agoUniversity of Hawaii Cancer Center hit by ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkUniversity of Hawaii Cancer Center hit by ransomware attackplus-squarewww.bleepingcomputer.comTony Bark@pawb.social · 6 days agomessage-square0linkfedilink
cm0002@suppo.fi · 6 days agoVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerability Report - December 2025plus-squarewww.vulnerability-lookup.orgcm0002@suppo.fi · 6 days agomessage-square0linkfedilink
cm0002@infosec.pub · 5 days agoA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkA Libre Architecture for Verifiable Data Collection and Proof-of-Check Timestampingplus-squaredoi.orgcm0002@infosec.pub · 5 days agomessage-square0linkfedilink
Sepia@mander.xyz · 9 days agoCyberwarfare: China-Linked UAT-7290 usually active in South Asia expands its espionage-focused intrusions into Southeastern Europe, targeting telecomsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCyberwarfare: China-Linked UAT-7290 usually active in South Asia expands its espionage-focused intrusions into Southeastern Europe, targeting telecomsplus-squarethehackernews.comSepia@mander.xyz · 9 days agomessage-square0linkfedilink
cm0002@toast.ooo · 10 days agoNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkNi8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labsplus-squarewww.cyera.comcm0002@toast.ooo · 10 days agomessage-square0linkfedilink
cm0002@literature.cafe · 11 days agoDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkDozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Riskplus-squarewww.infostealers.comcm0002@literature.cafe · 11 days agomessage-square0linkfedilink
cm0002@literature.cafe · 11 days agoChina hacked email systems of US congressional committee staffplus-squarewww.ft.comexternal-linkmessage-square0linkfedilinkarrow-up160arrow-down11
arrow-up159arrow-down1external-linkChina hacked email systems of US congressional committee staffplus-squarewww.ft.comcm0002@literature.cafe · 11 days agomessage-square0linkfedilink
cm0002@literature.cafe · 12 days ago"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-link"MongoBleed": Exploit for critical vulnerability in MongoDB makes attacks easierplus-squarewww.heise.decm0002@literature.cafe · 12 days agomessage-square0linkfedilink
cm0002@literature.cafe · 12 days agoBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.deexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkBluetooth Headphone Jacking: A Key to Your Phoneplus-squaremedia.ccc.decm0002@literature.cafe · 12 days agomessage-square1linkfedilink
Hotznplotzn · 12 days agoTaiwan says Chinese cyber attacks on critical infrastructure are up 113% daily since 2023plus-squareindustrialcyber.coexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkTaiwan says Chinese cyber attacks on critical infrastructure are up 113% daily since 2023plus-squareindustrialcyber.coHotznplotzn · 12 days agomessage-square0linkfedilink
Hotznplotzn · 15 days agoChina-linked Salt Typhoon hackers ‘almost certainly’ in Australia and New Zealand’s critical infrastructureplus-squarewww.smh.com.auexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkChina-linked Salt Typhoon hackers ‘almost certainly’ in Australia and New Zealand’s critical infrastructureplus-squarewww.smh.com.auHotznplotzn · 15 days agomessage-square0linkfedilink
cm0002@lemdro.id · 15 days agoThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkThe Kimwolf Botnet is Stalking Your Local Networkplus-squarekrebsonsecurity.comcm0002@lemdro.id · 15 days agomessage-square0linkfedilink
noumenon@lemmy.world · 17 days agoThe Attacks That Defined 2025plus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down12
arrow-up15arrow-down1external-linkThe Attacks That Defined 2025plus-squarearstechnica.comnoumenon@lemmy.world · 17 days agomessage-square0linkfedilink
noumenon@lemmy.world · 18 days agoTrump Administration Removes Three Spyware-Linked Execs From Sanctions Listplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up142arrow-down10
arrow-up142arrow-down1external-linkTrump Administration Removes Three Spyware-Linked Execs From Sanctions Listplus-squarewww.reuters.comnoumenon@lemmy.world · 18 days agomessage-square0linkfedilink
noumenon@lemmy.world · 18 days agoDarkSpectre Hackers Spread Malware To 8.8 Million Chrome, Edge, and Firefox Usersplus-squarecyberpress.orgexternal-linkmessage-square0linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkDarkSpectre Hackers Spread Malware To 8.8 Million Chrome, Edge, and Firefox Usersplus-squarecyberpress.orgnoumenon@lemmy.world · 18 days agomessage-square0linkfedilink
Tony Bark@pawb.social · 22 days agoNPM package with 56,000 downloads compromises WhatsApp accountsplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkNPM package with 56,000 downloads compromises WhatsApp accountsplus-squaresecurityaffairs.comTony Bark@pawb.social · 22 days agomessage-square0linkfedilink
cm0002@mander.xyz · 25 days agoWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgexternal-linkmessage-square5linkfedilinkarrow-up118arrow-down13
arrow-up115arrow-down1external-linkWhy We Abandoned Matrix: The Dark Truth About User Security and Safetyplus-squareforum.hackliberty.orgcm0002@mander.xyz · 25 days agomessage-square5linkfedilink