Kid@sh.itjust.worksMEnglish · 13 hours agoiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comexternal-linkmessage-square5fedilinkarrow-up130arrow-down18
arrow-up122arrow-down1external-linkiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoHacker Claims Twilio's SendGrid Data Breach, Selling 848,000 Recordsplus-squarehackread.comexternal-linkmessage-square2fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHacker Claims Twilio's SendGrid Data Breach, Selling 848,000 Recordsplus-squarehackread.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square2fedilink
PhilipTheBucket@ponder.catEnglish · 4 hours agoSuspected Chinese snoops hijacking buggy Ivanti gear — againplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSuspected Chinese snoops hijacking buggy Ivanti gear — againplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 4 hours agomessage-square0fedilink
Tea@programming.devEnglish · 5 hours agoThreat actors leverage tax season to deploy tax-themed phishing campaigns.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThreat actors leverage tax season to deploy tax-themed phishing campaigns.plus-squarewww.microsoft.comTea@programming.devEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoOver 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaignplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkOver 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaignplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoOnly 1% of malicious emails that reach inboxes deliver malware - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square5fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkOnly 1% of malicious emails that reach inboxes deliver malware - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoOpen-source malware doubles, data exfiltration attacks dominate - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square6fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkOpen-source malware doubles, data exfiltration attacks dominate - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoRecent GitHub supply chain attack traced to leaked SpotBugs tokenplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkRecent GitHub supply chain attack traced to leaked SpotBugs tokenplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoChina’s FamousSparrow APT Hits Americas with SparrowDoor Malwareplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkChina’s FamousSparrow APT Hits Americas with SparrowDoor Malwareplus-squarehackread.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 12 hours agoHacking the Call Records of Millions of Americansplus-squareevanconnelly.github.ioexternal-linkmessage-square6fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkHacking the Call Records of Millions of Americansplus-squareevanconnelly.github.ioKid@sh.itjust.worksMEnglish · 12 hours agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 7 hours agoRoyal Mail investigates data leak claims, no impact on operationsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkRoyal Mail investigates data leak claims, no impact on operationsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoGoogle Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuseplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuseplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 10 hours agoNSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat | CISAplus-squarewww.cisa.govexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkNSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat | CISAplus-squarewww.cisa.govKid@sh.itjust.worksMEnglish · 10 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoSophisticated QR Code Phishing Attack Targeting Microsoft 365 Users to Steal Loginsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkSophisticated QR Code Phishing Attack Targeting Microsoft 365 Users to Steal Loginsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoOver 500 Phishing Domains Emerge Following Bybit Heistplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkOver 500 Phishing Domains Emerge Following Bybit Heistplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 11 hours agoTriada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devicesplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkTriada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devicesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 11 hours agomessage-square1fedilink
opalfrost@friendica.world · 12 hours agoSec Funds open to protect Fediplus-squaremessage-squaremessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1message-squareSec Funds open to protect Fediplus-squareopalfrost@friendica.world · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day ago65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comexternal-linkmessage-square12fedilinkarrow-up185arrow-down11
arrow-up184arrow-down1external-link65% of the 100 largest US hospitals and health systems have had a recent data breachplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square12fedilink
opalfrost@friendica.world · 9 hours agoNew approach.plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1message-squareNew approach.plus-squareopalfrost@friendica.world · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoHackers Exploit Cloudflare for Advanced Phishing Attacksplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkHackers Exploit Cloudflare for Advanced Phishing Attacksplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0fedilink