Kid@sh.itjust.worksMEnglish · 5 hours agoBackdoor found in two healthcare patient monitors, linked to IP in Chinaplus-squarewww.bleepingcomputer.comexternal-linkmessage-square9fedilinkarrow-up155arrow-down13
arrow-up152arrow-down1external-linkBackdoor found in two healthcare patient monitors, linked to IP in Chinaplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square9fedilink
Nemeski@lemm.eeEnglish · 58 minutes agoWhatsApp says it disrupted a hacking campaign targeting journalists with Paragon spywareplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkWhatsApp says it disrupted a hacking campaign targeting journalists with Paragon spywareplus-squaretechcrunch.comNemeski@lemm.eeEnglish · 58 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 16 minutes agoItaly's data protection authority Garante blocked the DeepSeek AI platformplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkItaly's data protection authority Garante blocked the DeepSeek AI platformplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 16 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 13 minutes agoGoogle says its Gemini Chatbot is being exploited by state funded hackersplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle says its Gemini Chatbot is being exploited by state funded hackersplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksMEnglish · 13 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 minutes agoMizuno USA says hackers stayed in its network for two monthsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMizuno USA says hackers stayed in its network for two monthsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 19 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoTata Technologies Hacked - Ransomware Attack Compromises IT Systemsplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkTata Technologies Hacked - Ransomware Attack Compromises IT Systemsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoNew Syncjacking attack hijacks devices using Chrome extensionsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew Syncjacking attack hijacks devices using Chrome extensionsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoUAC-0063: Cyber Espionage Operation Expanding from Central Asiaplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkUAC-0063: Cyber Espionage Operation Expanding from Central Asiaplus-squarewww.bitdefender.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoNoma Research discovers RCE vulnerability in AI-development platform, Lightning AIplus-squarenoma.securityexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNoma Research discovers RCE vulnerability in AI-development platform, Lightning AIplus-squarenoma.securityKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTime Bandit ChatGPT jailbreak bypasses safeguards on sensitive topicsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square5fedilinkarrow-up142arrow-down10
arrow-up142arrow-down1external-linkTime Bandit ChatGPT jailbreak bypasses safeguards on sensitive topicsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNew RDP Exploit Allows Attackers to Take Over Windows and Browser Sessionsplus-squaregbhackers.comexternal-linkmessage-square5fedilinkarrow-up133arrow-down17
arrow-up126arrow-down1external-linkNew RDP Exploit Allows Attackers to Take Over Windows and Browser Sessionsplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoOdd QR Codeplus-squaremstdn.socialexternal-linkmessage-square1fedilinkarrow-up138arrow-down12
arrow-up136arrow-down1external-linkOdd QR Codeplus-squaremstdn.socialKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoHidden Text Salting Disrupts Brand Name Detection Systemsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square1fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHidden Text Salting Disrupts Brand Name Detection Systemsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoMaryland healthcare network forced to shut down IT systems after ransomware attackplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkMaryland healthcare network forced to shut down IT systems after ransomware attackplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoFBI seizes major cybercrime forums in coordinated domain takedownplus-squarecyberscoop.comexternal-linkmessage-square1fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkFBI seizes major cybercrime forums in coordinated domain takedownplus-squarecyberscoop.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTeamViewer Clients Vulnerability Leads to Privilege Escalationplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkTeamViewer Clients Vulnerability Leads to Privilege Escalationplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoCVE-2024-56614 & CVE-2024-56615: PoC Exploits Released for Severe eBPF Vulnerabilities in Linux Kernelplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCVE-2024-56614 & CVE-2024-56615: PoC Exploits Released for Severe eBPF Vulnerabilities in Linux Kernelplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoLazarus Group's latest heist hits hundreds globallyplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkLazarus Group's latest heist hits hundreds globallyplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoTorNet: A New Backdoor That Uses TOR to Anonymize C2 Communicationplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkTorNet: A New Backdoor That Uses TOR to Anonymize C2 Communicationplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNew SMS-Based Phishing Tool 'DevilTraff' Enables Mass Cyber Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkNew SMS-Based Phishing Tool 'DevilTraff' Enables Mass Cyber Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink