aramova@infosec.pub · 3 hours agoDOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square4fedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkDOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunchplus-squaretechcrunch.comaramova@infosec.pub · 3 hours agomessage-square4fedilink
Tea@programming.dev · 7 hours ago'Uber for nurses' exposes 86k+ medical records, PII.plus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up130arrow-down12
arrow-up128arrow-down1external-link'Uber for nurses' exposes 86k+ medical records, PII.plus-squarewww.theregister.comTea@programming.dev · 7 hours agomessage-square1fedilink
floofloof@lemmy.ca · 21 hours agoGoogle researchers uncover critical security flaw in all AMD Zen processorsplus-squarewww.techspot.comexternal-linkmessage-square3fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkGoogle researchers uncover critical security flaw in all AMD Zen processorsplus-squarewww.techspot.comfloofloof@lemmy.ca · 21 hours agomessage-square3fedilink
cm0002@lemmy.world · 1 day agoThe ESP32 Bluetooth Backdoor That Wasn’tplus-squarehackaday.comexternal-linkmessage-square1fedilinkarrow-up138arrow-down10
arrow-up138arrow-down1external-linkThe ESP32 Bluetooth Backdoor That Wasn’tplus-squarehackaday.comcm0002@lemmy.world · 1 day agomessage-square1fedilink
Jonathan Snyder@infosec.pub · 2 days agoSnopes Twitter got hacked. Twitter screws up the responseplus-squareinfosec.exchangeexternal-linkmessage-square8fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkSnopes Twitter got hacked. Twitter screws up the responseplus-squareinfosec.exchangeJonathan Snyder@infosec.pub · 2 days agomessage-square8fedilink
Tea@programming.dev · 1 day agoSideWinder targets the maritime and nuclear sectors with an updated toolset.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSideWinder targets the maritime and nuclear sectors with an updated toolset.plus-squaresecurelist.comTea@programming.dev · 1 day agomessage-square0fedilink
shellsharks@infosec.pubM · 1 day agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 1 day agomessage-square0fedilink
Jonathan Snyder@infosec.pub · edit-22 days agoHow to Set Up Your Online Identity on Keyoxide: A Simple Guideplus-squareblog.epic-worlds.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Set Up Your Online Identity on Keyoxide: A Simple Guideplus-squareblog.epic-worlds.comJonathan Snyder@infosec.pub · edit-22 days agomessage-square0fedilink
cm0002@lemmy.world · 3 days agoYouTubers extorted via copyright strikes to spread malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkYouTubers extorted via copyright strikes to spread malwareplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 3 days agomessage-square0fedilink
Tea@programming.dev · edit-22 days agoUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down12
arrow-up1-1arrow-down1external-linkUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comTea@programming.dev · edit-22 days agomessage-square0fedilink
Fitik@fedia.io · 4 days agoHacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court orderplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court orderplus-squaretechcrunch.comFitik@fedia.io · 4 days agomessage-square0fedilink
cm0002@lemmy.world · 3 days agoUndocumented backdoor found in Bluetooth chip used by a billion devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down12
arrow-up1-1arrow-down1external-linkUndocumented backdoor found in Bluetooth chip used by a billion devicesplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 3 days agomessage-square0fedilink
shellsharks@infosec.pubM · 4 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 4 days agomessage-square0fedilink
cm0002@lemmy.world · 5 days agoInvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationsplus-squarecybersecuritynews.comcm0002@lemmy.world · 5 days agomessage-square0fedilink
Tea@programming.dev · 5 days agoExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioTea@programming.dev · 5 days agomessage-square0fedilink
Tea@programming.dev · 5 days agoMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comTea@programming.dev · 5 days agomessage-square0fedilink
Tea@programming.dev · edit-25 days agoViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govTea@programming.dev · edit-25 days agomessage-square0fedilink
Tea@programming.dev · 6 days agoUnmasking the new persistent attacks on Japan.plus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnmasking the new persistent attacks on Japan.plus-squareblog.talosintelligence.comTea@programming.dev · 6 days agomessage-square0fedilink
Tea@programming.dev · edit-26 days agoStealers and backdoors are spreading under the guise of a DeepSeek client.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStealers and backdoors are spreading under the guise of a DeepSeek client.plus-squaresecurelist.comTea@programming.dev · edit-26 days agomessage-square0fedilink
Tea@programming.dev · edit-26 days agoBADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected(backdoored) with malware that conscripts them into a botnet.plus-squarewww.humansecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected(backdoored) with malware that conscripts them into a botnet.plus-squarewww.humansecurity.comTea@programming.dev · edit-26 days agomessage-square0fedilink