Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoGoogle says its Gemini Chatbot is being exploited by state funded hackersplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square4fedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkGoogle says its Gemini Chatbot is being exploited by state funded hackersplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square4fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoItaly's data protection authority Garante blocked the DeepSeek AI platformplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkItaly's data protection authority Garante blocked the DeepSeek AI platformplus-squaresecurityaffairs.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 hours agoMizuno USA says hackers stayed in its network for two monthsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMizuno USA says hackers stayed in its network for two monthsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agoTata Technologies Hacked - Ransomware Attack Compromises IT Systemsplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkTata Technologies Hacked - Ransomware Attack Compromises IT Systemsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 hours agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoUAC-0063: Cyber Espionage Operation Expanding from Central Asiaplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkUAC-0063: Cyber Espionage Operation Expanding from Central Asiaplus-squarewww.bitdefender.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoNoma Research discovers RCE vulnerability in AI-development platform, Lightning AIplus-squarenoma.securityexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNoma Research discovers RCE vulnerability in AI-development platform, Lightning AIplus-squarenoma.securityKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoBackdoor found in two healthcare patient monitors, linked to IP in Chinaplus-squarewww.bleepingcomputer.comexternal-linkmessage-square11fedilinkarrow-up161arrow-down13
arrow-up158arrow-down1external-linkBackdoor found in two healthcare patient monitors, linked to IP in Chinaplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square11fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoNew Syncjacking attack hijacks devices using Chrome extensionsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNew Syncjacking attack hijacks devices using Chrome extensionsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoLazarus Group's latest heist hits hundreds globallyplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkLazarus Group's latest heist hits hundreds globallyplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNew RDP Exploit Allows Attackers to Take Over Windows and Browser Sessionsplus-squaregbhackers.comexternal-linkmessage-square5fedilinkarrow-up133arrow-down18
arrow-up125arrow-down1external-linkNew RDP Exploit Allows Attackers to Take Over Windows and Browser Sessionsplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square5fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoTeamViewer Clients Vulnerability Leads to Privilege Escalationplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkTeamViewer Clients Vulnerability Leads to Privilege Escalationplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoTorNet: A New Backdoor That Uses TOR to Anonymize C2 Communicationplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkTorNet: A New Backdoor That Uses TOR to Anonymize C2 Communicationplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoCVE-2024-56614 & CVE-2024-56615: PoC Exploits Released for Severe eBPF Vulnerabilities in Linux Kernelplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCVE-2024-56614 & CVE-2024-56615: PoC Exploits Released for Severe eBPF Vulnerabilities in Linux Kernelplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoFBI seizes major cybercrime forums in coordinated domain takedownplus-squarecyberscoop.comexternal-linkmessage-square1fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkFBI seizes major cybercrime forums in coordinated domain takedownplus-squarecyberscoop.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoTime Bandit ChatGPT jailbreak bypasses safeguards on sensitive topicsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square5fedilinkarrow-up142arrow-down10
arrow-up142arrow-down1external-linkTime Bandit ChatGPT jailbreak bypasses safeguards on sensitive topicsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square5fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNation-State Hackers Abuse Gemini AI Toolplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNation-State Hackers Abuse Gemini AI Toolplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNew Aquabotv3 botnet malware targets Mitel command injection flawplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNew Aquabotv3 botnet malware targets Mitel command injection flawplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoLazarus Hackers Altering Legitimate Software Packages To Launch Large-Scale Cyber Attackplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkLazarus Hackers Altering Legitimate Software Packages To Launch Large-Scale Cyber Attackplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoArcus Media Ransomware Displays Novel Process Targeting, Selective Encryption and Recovery Disruptionplus-squarewww.halcyon.aiexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkArcus Media Ransomware Displays Novel Process Targeting, Selective Encryption and Recovery Disruptionplus-squarewww.halcyon.aiKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNew SMS-Based Phishing Tool 'DevilTraff' Enables Mass Cyber Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkNew SMS-Based Phishing Tool 'DevilTraff' Enables Mass Cyber Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink