Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoNATO defense supplier Thales confirms data breach | Cybernewsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNATO defense supplier Thales confirms data breach | Cybernewsplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoCisco warns of new critical SD-WAN flaw exploited in zero-day attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCisco warns of new critical SD-WAN flaw exploited in zero-day attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoCritical NGINX flaw enables remote exploits | Cybernewsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical NGINX flaw enables remote exploits | Cybernewsplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoNew Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruptionplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruptionplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoPraisonAI vulnerability gets scanned within 4 hours of disclosure | CSO Onlineplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPraisonAI vulnerability gets scanned within 4 hours of disclosure | CSO Onlineplus-squarewww.csoonline.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoCritical Next.js Vulnerability Exposes Cloud Credentials, API keys, and Admin Panelsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCritical Next.js Vulnerability Exposes Cloud Credentials, API keys, and Admin Panelsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoThe time of much patching is comingplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe time of much patching is comingplus-squareblog.talosintelligence.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoZero Day Initiative — Pwn2Own Berlin 2026 - Day One Resultsplus-squarewww.zerodayinitiative.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZero Day Initiative — Pwn2Own Berlin 2026 - Day One Resultsplus-squarewww.zerodayinitiative.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoKazuar: Anatomy of a nation-state botnet | Microsoft Security Blogplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKazuar: Anatomy of a nation-state botnet | Microsoft Security Blogplus-squarewww.microsoft.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoOpenAI asks macOS users to update after TanStack npm supply chain attackplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpenAI asks macOS users to update after TanStack npm supply chain attackplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days ago18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCEplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCEplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days ago716,000 Impacted by OpenLoop Health Data Breach - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link716,000 Impacted by OpenLoop Health Data Breach - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoGlobal Cyber Agencies Issue New SBOMs for AI Guidance - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGlobal Cyber Agencies Issue New SBOMs for AI Guidance - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoChipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoClickFix finds a backup plan in PySoxy proxy chains | CSO Onlineplus-squarewww.csoonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkClickFix finds a backup plan in PySoxy proxy chains | CSO Onlineplus-squarewww.csoonline.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoIranian hackers targeted major South Korean electronics makerplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIranian hackers targeted major South Korean electronics makerplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoLatAm Vibe Hackers Generate Custom Hacking Tools on the Flyplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLatAm Vibe Hackers Generate Custom Hacking Tools on the Flyplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink