Kid@sh.itjust.worksMEnglish · 4 hours agoClaude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkClaude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoMicrosoft: Exchange Online flags legitimate emails as phishingplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMicrosoft: Exchange Online flags legitimate emails as phishingplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoNew Node.js Based LTX Stealer Attackers Users to Exfiltrate Login Credentialsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNew Node.js Based LTX Stealer Attackers Users to Exfiltrate Login Credentialsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoBeyondTrust warns of critical RCE flaw in remote support softwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkBeyondTrust warns of critical RCE flaw in remote support softwareplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoBloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaignplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaignplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 14 hours agoChina’s Salt Typhoon hackers broke into Norwegian companiesplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkChina’s Salt Typhoon hackers broke into Norwegian companiesplus-squaretechcrunch.comHotznplotzn@lemmy.sdf.orgEnglish · 14 hours agomessage-square0fedilink
Karna@lemmy.mlEnglish · edit-21 day agoState actor targets 155 countries in 'Shadow Campaigns' espionage opplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkState actor targets 155 countries in 'Shadow Campaigns' espionage opplus-squarewww.bleepingcomputer.comKarna@lemmy.mlEnglish · edit-21 day agomessage-square0fedilink
Innerworld@lemmy.worldEnglish · 2 days agoSubstack said a security breach discovered this week allowed an intruder to access users’ email addresses, phone numbers, and internal metadata in Octoberplus-squarewww.pcmag.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkSubstack said a security breach discovered this week allowed an intruder to access users’ email addresses, phone numbers, and internal metadata in Octoberplus-squarewww.pcmag.comInnerworld@lemmy.worldEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCISA orders federal agencies to replace end-of-life edge devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCISA orders federal agencies to replace end-of-life edge devicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCompromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malwareplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCompromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malwareplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoFlickr discloses potential data breach exposing users' names, emailsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkFlickr discloses potential data breach exposing users' names, emailsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 3 days ago8.7 billion records spilled: Inside the massive Chinese data leakplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down12
arrow-up17arrow-down1external-link8.7 billion records spilled: Inside the massive Chinese data leakplus-squarecybernews.comHotznplotzn@lemmy.sdf.orgEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoChina-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Deliveryplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkChina-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Deliveryplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoAsian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entitiesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkAsian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entitiesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoRenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controlsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkRenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controlsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoAPT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agenciesplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkAPT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agenciesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoCritical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflowsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkCritical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflowsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoMalicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaignplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMalicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaignplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 5 days agoNitrogen can't unlock its own ransomware after coding errorplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkNitrogen can't unlock its own ransomware after coding errorplus-squarewww.theregister.comBrikoX@lemmy.zipEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoCISA: VMware ESXi flaw now exploited in ransomware attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCISA: VMware ESXi flaw now exploited in ransomware attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink