Pro@programming.dev · 2 days agoGreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routersplus-squarewww.greynoise.ioexternal-linkmessage-square0linkfedilinkarrow-up125
arrow-up125external-linkGreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routersplus-squarewww.greynoise.ioPro@programming.dev · 2 days agomessage-square0linkfedilink
cm0002@lemmy.world · 3 days agoCISA loses nearly all top officials as purge continuesplus-squarewww.cybersecuritydive.comexternal-linkmessage-square3linkfedilinkarrow-up151
arrow-up151external-linkCISA loses nearly all top officials as purge continuesplus-squarewww.cybersecuritydive.comcm0002@lemmy.world · 3 days agomessage-square3linkfedilink
Hotznplotzn@lemmy.sdf.org · 3 days agoDutch intelligence report says Russian hacker group stole data on 63,000 police officers, targeted NATO government systemsplus-squaretheins.ruexternal-linkmessage-square0linkfedilinkarrow-up120
arrow-up120external-linkDutch intelligence report says Russian hacker group stole data on 63,000 police officers, targeted NATO government systemsplus-squaretheins.ruHotznplotzn@lemmy.sdf.org · 3 days agomessage-square0linkfedilink
Pro@programming.dev · 2 days agoOneDrive File Picker Flaw Provides ChatGPT and Other Web Apps Full Read Access to Users’ Entire OneDriveplus-squarewww.oasis.securityexternal-linkmessage-square0linkfedilinkarrow-up16
arrow-up16external-linkOneDrive File Picker Flaw Provides ChatGPT and Other Web Apps Full Read Access to Users’ Entire OneDriveplus-squarewww.oasis.securityPro@programming.dev · 2 days agomessage-square0linkfedilink
Pro@programming.dev · 2 days agoEvolution of Zanubis, a banking Trojan for Androidplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up13
arrow-up13external-linkEvolution of Zanubis, a banking Trojan for Androidplus-squaresecurelist.comPro@programming.dev · 2 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 3 days agoUK Envoy Urges Transatlantic Tech Alliance, Cites China Threatplus-squarewww.bloomberg.comexternal-linkmessage-square0linkfedilinkarrow-up15
arrow-up15external-linkUK Envoy Urges Transatlantic Tech Alliance, Cites China Threatplus-squarewww.bloomberg.comHotznplotzn@lemmy.sdf.org · 3 days agomessage-square0linkfedilink
Pro@programming.dev · 3 days agoText-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websitesplus-squarecloud.google.comexternal-linkmessage-square0linkfedilinkarrow-up12
arrow-up12external-linkText-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websitesplus-squarecloud.google.comPro@programming.dev · 3 days agomessage-square0linkfedilink
Pro@programming.dev · 4 days agoNew Russia-affiliated actor Void Blizzard targets critical sectors for espionageplus-squarewww.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkNew Russia-affiliated actor Void Blizzard targets critical sectors for espionageplus-squarewww.microsoft.comPro@programming.dev · 4 days agomessage-square0linkfedilink
cm0002@lemmy.world · 4 days agoSuspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwordsplus-squarewww.websiteplanet.comexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkSuspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwordsplus-squarewww.websiteplanet.comcm0002@lemmy.world · 4 days agomessage-square0linkfedilink
cm0002@lemmy.world · 4 days agoRemote Prompt Injection in GitLab Duo Leads to Source Code Theftplus-squarewww.legitsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up16
arrow-up16external-linkRemote Prompt Injection in GitLab Duo Leads to Source Code Theftplus-squarewww.legitsecurity.comcm0002@lemmy.world · 4 days agomessage-square0linkfedilink
cm0002@lemmy.world · 3 days agoNIST Introduces New Metric to Measure Likelihood of Vulnerability Exploitsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0linkfedilinkarrow-up11
arrow-up11external-linkNIST Introduces New Metric to Measure Likelihood of Vulnerability Exploitsplus-squarewww.infosecurity-magazine.comcm0002@lemmy.world · 3 days agomessage-square0linkfedilink
Pro@programming.dev · 7 days agoDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioexternal-linkmessage-square0linkfedilinkarrow-up114
arrow-up114external-linkDissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attackplus-squareblog.kandji.ioPro@programming.dev · 7 days agomessage-square0linkfedilink
cm0002@lemmy.world · 7 days agoA local server designed to load one or more pre-trained NLP models during startup and expose them through a clean, RESTful APIplus-squaregithub.comexternal-linkmessage-square1linkfedilinkarrow-up18
arrow-up18external-linkA local server designed to load one or more pre-trained NLP models during startup and expose them through a clean, RESTful APIplus-squaregithub.comcm0002@lemmy.world · 7 days agomessage-square1linkfedilink
cm0002@lemmy.world · 7 days ago270 arrested in global dark web crackdown targeting online drug and criminal networks | Europolplus-squarewww.europol.europa.euexternal-linkmessage-square0linkfedilinkarrow-up110
arrow-up110external-link270 arrested in global dark web crackdown targeting online drug and criminal networks | Europolplus-squarewww.europol.europa.eucm0002@lemmy.world · 7 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 8 days agoGerman Cyber Agency Sounds Warning on Grid Vulnerabilities across Europeplus-squarewww.bankinfosecurity.comexternal-linkmessage-square2linkfedilinkarrow-up15
arrow-up15external-linkGerman Cyber Agency Sounds Warning on Grid Vulnerabilities across Europeplus-squarewww.bankinfosecurity.comHotznplotzn@lemmy.sdf.org · 8 days agomessage-square2linkfedilink
Pro@programming.dev · 8 days agoDanaBot malware disrupted, threat actors namedintel471.comexternal-linkmessage-square0linkfedilinkarrow-up17
arrow-up17external-linkDanaBot malware disrupted, threat actors namedintel471.comPro@programming.dev · 8 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 8 days agoDenmark finds ‘suspicious’ components in key infrastructure imports, raising concerns about espionage and energy securityplus-squaremessage-squaremessage-square0linkfedilinkarrow-up118
arrow-up118message-squareDenmark finds ‘suspicious’ components in key infrastructure imports, raising concerns about espionage and energy securityplus-squareHotznplotzn@lemmy.sdf.org · 8 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 8 days agoChinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report saysplus-squaregbhackers.comexternal-linkmessage-square0linkfedilinkarrow-up18
arrow-up18external-linkChinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report saysplus-squaregbhackers.comHotznplotzn@lemmy.sdf.org · 8 days agomessage-square0linkfedilink
Pro@programming.dev · 9 days agoNew Variant of Crypto Confidence Scamplus-squareisc.sans.eduexternal-linkmessage-square0linkfedilinkarrow-up18
arrow-up18external-linkNew Variant of Crypto Confidence Scamplus-squareisc.sans.eduPro@programming.dev · 9 days agomessage-square0linkfedilink
Pro@programming.dev · 9 days agoThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up13
arrow-up13external-linkThreat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizationsplus-squarewww.cisa.govPro@programming.dev · 9 days agomessage-square0linkfedilink