Kid@sh.itjust.worksMEnglish · 3 days agoNATO defense supplier Thales confirms data breach | Cybernewsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNATO defense supplier Thales confirms data breach | Cybernewsplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCisco warns of new critical SD-WAN flaw exploited in zero-day attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco warns of new critical SD-WAN flaw exploited in zero-day attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCritical NGINX flaw enables remote exploits | Cybernewsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical NGINX flaw enables remote exploits | Cybernewsplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNew Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruptionplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruptionplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoPraisonAI vulnerability gets scanned within 4 hours of disclosure | CSO Onlineplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPraisonAI vulnerability gets scanned within 4 hours of disclosure | CSO Onlineplus-squarewww.csoonline.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCritical Next.js Vulnerability Exposes Cloud Credentials, API keys, and Admin Panelsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Next.js Vulnerability Exposes Cloud Credentials, API keys, and Admin Panelsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoThe time of much patching is comingplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe time of much patching is comingplus-squareblog.talosintelligence.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoZero Day Initiative — Pwn2Own Berlin 2026 - Day One Resultsplus-squarewww.zerodayinitiative.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZero Day Initiative — Pwn2Own Berlin 2026 - Day One Resultsplus-squarewww.zerodayinitiative.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoKazuar: Anatomy of a nation-state botnet | Microsoft Security Blogplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKazuar: Anatomy of a nation-state botnet | Microsoft Security Blogplus-squarewww.microsoft.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoOpenAI asks macOS users to update after TanStack npm supply chain attackplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpenAI asks macOS users to update after TanStack npm supply chain attackplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
floofloof@lemmy.caEnglish · 3 days agoFired hacker twins forget to end Teams recording, capture own crimesplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFired hacker twins forget to end Teams recording, capture own crimesplus-squarearstechnica.comfloofloof@lemmy.caEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days ago716,000 Impacted by OpenLoop Health Data Breach - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link716,000 Impacted by OpenLoop Health Data Breach - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Eager Eagle@lemmy.worldEnglish · edit-24 days ago18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCEplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10cross-posted to: cybersecurity@sh.itjust.works
arrow-up11arrow-down1external-link18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCEplus-squarethehackernews.comEager Eagle@lemmy.worldEnglish · edit-24 days agomessage-square0fedilinkcross-posted to: cybersecurity@sh.itjust.works
Kid@sh.itjust.worksMEnglish · 4 days agoMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoGlobal Cyber Agencies Issue New SBOMs for AI Guidance - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGlobal Cyber Agencies Issue New SBOMs for AI Guidance - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoChipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoClickFix finds a backup plan in PySoxy proxy chains | CSO Onlineplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClickFix finds a backup plan in PySoxy proxy chains | CSO Onlineplus-squarewww.csoonline.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoIranian hackers targeted major South Korean electronics makerplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers targeted major South Korean electronics makerplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink