Hotznplotzn@lemmy.sdf.org · 8 hours agoQilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UKplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up11
arrow-up11external-linkQilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UKplus-squarehackread.comHotznplotzn@lemmy.sdf.org · 8 hours agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 2 days agoCanada orders China's Hikvision to close Canadian operations over national security concernsplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up19
arrow-up19external-linkCanada orders China's Hikvision to close Canadian operations over national security concernsplus-squarewww.reuters.comHotznplotzn@lemmy.sdf.org · 2 days agomessage-square0linkfedilink
cm0002@lemmy.world · 2 days agoCitrix Bleed 2 flaw now believed to be exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19
arrow-up19external-linkCitrix Bleed 2 flaw now believed to be exploited in attacksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 2 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 3 days agoAuthoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studyplus-squarewww.swp-berlin.orgexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkAuthoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studyplus-squarewww.swp-berlin.orgHotznplotzn@lemmy.sdf.org · 3 days agomessage-square0linkfedilink
Pro@programming.dev · 3 days agoCriminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudplus-squarewww.ic3.govexternal-linkmessage-square0linkfedilinkarrow-up13
arrow-up13external-linkCriminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudplus-squarewww.ic3.govPro@programming.dev · 3 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 3 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13
arrow-up13message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 3 days agomessage-square0linkfedilink
Pro@programming.dev · 3 days agomommy Access Brokerintel471.comexternal-linkmessage-square0linkfedilinkarrow-up11
arrow-up11external-linkmommy Access Brokerintel471.comPro@programming.dev · 3 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 5 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square4linkfedilinkarrow-up15
arrow-up15message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 5 days agomessage-square4linkfedilink
cm0002@lemmy.world · 6 days agoDon't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attackplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up121
arrow-up121external-linkDon't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attackplus-squarewww.theregister.comcm0002@lemmy.world · 6 days agomessage-square0linkfedilink
Pro@programming.dev · 5 days agoIranian Educated Manticore Targets Leading Tech Academicsplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up13
arrow-up13external-linkIranian Educated Manticore Targets Leading Tech Academicsplus-squareresearch.checkpoint.comPro@programming.dev · 5 days agomessage-square0linkfedilink
Pro@programming.dev · 5 days agoIn the Wild: Malware Prototype with Embedded Prompt Injectionplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up13
arrow-up13external-linkIn the Wild: Malware Prototype with Embedded Prompt Injectionplus-squareresearch.checkpoint.comPro@programming.dev · 5 days agomessage-square0linkfedilink
cm0002@lemmy.world · 6 days ago⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and Moreplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-link⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and Moreplus-squarethehackernews.comcm0002@lemmy.world · 6 days agomessage-square0linkfedilink
randomname@scribe.disroot.org · 7 days agoCanada says Chinese-backed hackers were likely behind recent malicious activity targeting domestic telecommunications infrastructureplus-squarewww.insurancejournal.comexternal-linkmessage-square0linkfedilinkarrow-up18
arrow-up18external-linkCanada says Chinese-backed hackers were likely behind recent malicious activity targeting domestic telecommunications infrastructureplus-squarewww.insurancejournal.comrandomname@scribe.disroot.org · 7 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 6 days agoChina-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devicesplus-squaresecurityscorecard.comexternal-linkmessage-square0linkfedilinkarrow-up14
arrow-up14external-linkChina-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devicesplus-squaresecurityscorecard.comHotznplotzn@lemmy.sdf.org · 6 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 7 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up16
arrow-up16message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 7 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 6 days agoChina: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19plus-squarewww.article19.orgexternal-linkmessage-square0linkfedilinkarrow-up13
arrow-up13external-linkChina: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19plus-squarewww.article19.orgHotznplotzn@lemmy.sdf.org · 6 days agomessage-square0linkfedilink
Pro@programming.dev · edit-27 days agoDoes the digital security equilibrium hold under AI?plus-squarewww.bsg.ox.ac.ukexternal-linkmessage-square0linkfedilinkarrow-up14
arrow-up14external-linkDoes the digital security equilibrium hold under AI?plus-squarewww.bsg.ox.ac.ukPro@programming.dev · edit-27 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 8 days agoDisinformation for beginners: How access to TikTok is threatening European securityplus-squareecfr.euexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkDisinformation for beginners: How access to TikTok is threatening European securityplus-squareecfr.euHotznplotzn@lemmy.sdf.org · 8 days agomessage-square0linkfedilink
cm0002@lemmy.world · 8 days agoStegano 2.0.0 released with functions to hide and reveal messages in PCM encoded .wav filesplus-squaremessage-squaremessage-square0linkfedilinkarrow-up15
arrow-up15message-squareStegano 2.0.0 released with functions to hide and reveal messages in PCM encoded .wav filesplus-squarecm0002@lemmy.world · 8 days agomessage-square0linkfedilink
cm0002@lemmy.world · 9 days agoReview: Learning Kali Linux, 2nd Editionplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up16
arrow-up16external-linkReview: Learning Kali Linux, 2nd Editionplus-squarewww.helpnetsecurity.comcm0002@lemmy.world · 9 days agomessage-square0linkfedilink