Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoGoogle Patches 25 Android Flaws, Including Critical Privilege Escalation Bugplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Patches 25 Android Flaws, Including Critical Privilege Escalation Bugplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 hours agoSplunk Patches High-Severity Vulnerabilities in Enterprise Productplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Patches High-Severity Vulnerabilities in Enterprise Productplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 13 hours agoLatest Intel CPUs impacted by new Indirector side-channel attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLatest Intel CPUs impacted by new Indirector side-channel attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 13 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 13 hours agoPrudential Financial now says 2.5 million impacted by data breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPrudential Financial now says 2.5 million impacted by data breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 13 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoJuniper releases out-of-cycle fix for max severity auth bypass flawplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJuniper releases out-of-cycle fix for max severity auth bypass flawplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoRemote access giant TeamViewer says Russian spies hacked its corporate networkplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRemote access giant TeamViewer says Russian spies hacked its corporate networkplus-squaretechcrunch.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoMicrosoft Alerts More Users in Update to Midnight Blizzard Hackplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Alerts More Users in Update to Midnight Blizzard Hackplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoPolice allege ‘evil twin’ in-flight Wi-Fi used to steal infoplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPolice allege ‘evil twin’ in-flight Wi-Fi used to steal infoplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoGoogle cuts ties with Entrust in Chrome over trust issuesplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle cuts ties with Entrust in Chrome over trust issuesplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days ago'Poseidon' Mac stealer distributed via Google adsplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link'Poseidon' Mac stealer distributed via Google adsplus-squarewww.malwarebytes.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoGitLab vulnerability permits running pipeline tasks under another userplus-squarestackdiary.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitLab vulnerability permits running pipeline tasks under another userplus-squarestackdiary.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoCISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilitiesplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilitiesplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoNew Unfurling Hemlock threat actor floods systems with malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Unfurling Hemlock threat actor floods systems with malwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoTeamViewer investigating intrusion of corporate IT environmentplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTeamViewer investigating intrusion of corporate IT environmentplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoApple AirPods Bug Allows Eavesdroppingplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple AirPods Bug Allows Eavesdroppingplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoFederal Reserve "breached" data may actually belong to Evolve Bankplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFederal Reserve "breached" data may actually belong to Evolve Bankplus-squarewww.malwarebytes.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoGoogle TAG details nightmare whack-a-mole with Dragonbridge disinfo groupplus-squarewww.scmagazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle TAG details nightmare whack-a-mole with Dragonbridge disinfo groupplus-squarewww.scmagazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoResurgent malware targets Outlook and Thunderbird users but bypasses Russiaplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResurgent malware targets Outlook and Thunderbird users but bypasses Russiaplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoChinese State Actors Use Ransomware to Conceal Real Intentplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese State Actors Use Ransomware to Conceal Real Intentplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agoDangerous AI Workaround: 'Skeleton Key' Unlocks Malicious Contentplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDangerous AI Workaround: 'Skeleton Key' Unlocks Malicious Contentplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 6 days agomessage-square0fedilink