Kid@sh.itjust.worksMEnglish · 1 day agoiPhone USB-C is hackable, but users don't need to worry yetplus-squarewww.techspot.comexternal-linkmessage-square21fedilinkarrow-up150arrow-down13
arrow-up147arrow-down1external-linkiPhone USB-C is hackable, but users don't need to worry yetplus-squarewww.techspot.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square21fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNSA Warns iPhone And Android Users—Disable Location Trackingplus-squarewww.forbes.comexternal-linkmessage-square50fedilinkarrow-up1131arrow-down11
arrow-up1130arrow-down1external-linkNSA Warns iPhone And Android Users—Disable Location Trackingplus-squarewww.forbes.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square50fedilink
Nemeski@lemm.eeEnglish · 1 day agoMalware stole internal PowerSchool passwords from engineer's hacked computerplus-squaretechcrunch.comexternal-linkmessage-square2fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkMalware stole internal PowerSchool passwords from engineer's hacked computerplus-squaretechcrunch.comNemeski@lemm.eeEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoFBI warns agents of call log thefts by hackers, Bloomberg News reportsplus-squarewww.reuters.comexternal-linkmessage-square4fedilinkarrow-up138arrow-down10
arrow-up138arrow-down1external-linkFBI warns agents of call log thefts by hackers, Bloomberg News reportsplus-squarewww.reuters.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square4fedilink
exu@feditown.comEnglish · 1 day agoBypassing disk encryption on systems with automatic TPM2unlockplus-squareoddlama.orgexternal-linkmessage-square2fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkBypassing disk encryption on systems with automatic TPM2unlockplus-squareoddlama.orgexu@feditown.comEnglish · 1 day agomessage-square2fedilink
Wolfie@lemm.eeEnglish · 1 day agoCybernotesplus-squarecybernotes.xyzexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCybernotesplus-squarecybernotes.xyzWolfie@lemm.eeEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoFCC Adopts Cybersecurity Rules in Wake of Salt Typhoonplus-squarebroadbandbreakfast.comexternal-linkmessage-square1fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkFCC Adopts Cybersecurity Rules in Wake of Salt Typhoonplus-squarebroadbandbreakfast.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoWolf Haldenstein law firm says 3.5 million impacted by data breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkWolf Haldenstein law firm says 3.5 million impacted by data breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoChinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reportsplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkChinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reportsplus-squarewww.reuters.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoAWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCVplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkAWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCVplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoMSSqlPwner: Open-source tool for pentesting MSSQL serversplus-squarewww.helpnetsecurity.comexternal-linkmessage-square1fedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkMSSqlPwner: Open-source tool for pentesting MSSQL serversplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoSneaky 2FA: exposing a new AiTM Phishing-as-a-Serviceplus-squareblog.sekoia.ioexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkSneaky 2FA: exposing a new AiTM Phishing-as-a-Serviceplus-squareblog.sekoia.ioKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Ⓜ3️⃣3️⃣ 🌌@lemmy.sdf.orgEnglish · 1 day agoTop 10 web hacking techniques of 2024: nominations openplus-squareportswigger.netexternal-linkmessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkTop 10 web hacking techniques of 2024: nominations openplus-squareportswigger.netⓂ3️⃣3️⃣ 🌌@lemmy.sdf.orgEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoThe $10 Cyber Threat Responsible for the Biggest Breaches of 2024plus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkThe $10 Cyber Threat Responsible for the Biggest Breaches of 2024plus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoHackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealerplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkHackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealerplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMicrosoft catches Russian state-sponsored hackers shifting tactics to WhatsAppplus-squarecyberscoop.comexternal-linkmessage-square0fedilinkarrow-up130arrow-down10
arrow-up130arrow-down1external-linkMicrosoft catches Russian state-sponsored hackers shifting tactics to WhatsAppplus-squarecyberscoop.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoTrusted Apps Sneak a Bug Into UEFI Boot Processplus-squarewww.darkreading.comexternal-linkmessage-square2fedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkTrusted Apps Sneak a Bug Into UEFI Boot Processplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoHackers leak configs and VPN credentials for 15,000 FortiGate devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square4fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkHackers leak configs and VPN credentials for 15,000 FortiGate devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square4fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoFBI deletes Chinese PlugX malware from thousands of US computersplus-squarewww.bleepingcomputer.comexternal-linkmessage-square6fedilinkarrow-up136arrow-down11
arrow-up135arrow-down1external-linkFBI deletes Chinese PlugX malware from thousands of US computersplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square6fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoBiden administration launches cybersecurity executive orderplus-squarewww.cnbc.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkBiden administration launches cybersecurity executive orderplus-squarewww.cnbc.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink