News Reporter@lemmy.wtfBEnglish · 1 hour agoNew SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrencyplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrencyplus-squaresecurelist.comNews Reporter@lemmy.wtfBEnglish · 1 hour agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 4 hours agoEuropean Club and Media Giant Abandon X Amid Growing Hate Speech Concernsthecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkEuropean Club and Media Giant Abandon X Amid Growing Hate Speech Concernsthecyberexpress.comNews Reporter@lemmy.wtfBEnglish · 4 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 3 hours agoBooking.com Phishers May Leave You With Reservationsplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBooking.com Phishers May Leave You With Reservationsplus-squarekrebsonsecurity.comNews Reporter@lemmy.wtfBEnglish · 3 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 5 hours agoIranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizationsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkIranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizationsplus-squarethehackernews.comNews Reporter@lemmy.wtfBEnglish · 5 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 6 hours agoDennis Kirk - 1,356,026 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDennis Kirk - 1,356,026 breached accountsplus-squarehaveibeenpwned.comNews Reporter@lemmy.wtfBEnglish · 6 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 7 hours agoCVE-2024-49060 Azure Stack HCI Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCVE-2024-49060 Azure Stack HCI Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comNews Reporter@lemmy.wtfBEnglish · 7 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 9 hours agoSOC Around the Clock: World Tour Survey Findingsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSOC Around the Clock: World Tour Survey Findingsplus-squarewww.trendmicro.comNews Reporter@lemmy.wtfBEnglish · 9 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 10 hours agoHooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emailsplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkHooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emailsplus-squarewww.trustwave.comNews Reporter@lemmy.wtfBEnglish · 10 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 11 hours agoMicrosoft Data Security Index annual report highlights evolving generative AI security needsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMicrosoft Data Security Index annual report highlights evolving generative AI security needsplus-squarewww.microsoft.comNews Reporter@lemmy.wtfBEnglish · 11 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 12 hours ago(In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environmentsplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link(In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environmentsplus-squarecloud.google.comNews Reporter@lemmy.wtfBEnglish · 12 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 13 hours agoElevate Your Threat Hunting with Elasticplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkElevate Your Threat Hunting with Elasticplus-squarewww.elastic.coNews Reporter@lemmy.wtfBEnglish · 13 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 14 hours agoCISA Releases Nineteen Industrial Control Systems Advisoriesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Releases Nineteen Industrial Control Systems Advisoriesplus-squarewww.cisa.govNews Reporter@lemmy.wtfBEnglish · 14 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 16 hours agoBotnet exploits GeoVision zero-day to install Mirai malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBotnet exploits GeoVision zero-day to install Mirai malwareplus-squarewww.bleepingcomputer.comNews Reporter@lemmy.wtfBEnglish · 16 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 1 day agoHot Topic - 56,904,909 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square6fedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkHot Topic - 56,904,909 breached accountsplus-squarehaveibeenpwned.comNews Reporter@lemmy.wtfBEnglish · 1 day agomessage-square6fedilink
News Reporter@lemmy.wtfBEnglish · 19 hours agoQSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaignsplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkQSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaignsplus-squaresecurelist.comNews Reporter@lemmy.wtfBEnglish · 19 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 17 hours agoSilent Skimmer Gets Loud (Again)plus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSilent Skimmer Gets Loud (Again)plus-squareunit42.paloaltonetworks.comNews Reporter@lemmy.wtfBEnglish · 17 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 18 hours agoIndian police arrest suspect in $230 million WazirX crypto exchange hackplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIndian police arrest suspect in $230 million WazirX crypto exchange hackplus-squaretherecord.mediaNews Reporter@lemmy.wtfBEnglish · 18 hours agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 1 day agoYmir: new stealthy ransomware in the wildplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkYmir: new stealthy ransomware in the wildplus-squaresecurelist.comNews Reporter@lemmy.wtfBEnglish · 1 day agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 1 day agoMicrosoft just killed the Windows 10 Beta Channel againplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMicrosoft just killed the Windows 10 Beta Channel againplus-squarewww.bleepingcomputer.comNews Reporter@lemmy.wtfBEnglish · 1 day agomessage-square0fedilink
News Reporter@lemmy.wtfBEnglish · 20 hours agoAn Interview With the Target & Home Depot Hackerplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn Interview With the Target & Home Depot Hackerplus-squarekrebsonsecurity.comNews Reporter@lemmy.wtfBEnglish · 20 hours agomessage-square0fedilink