Police allege ‘evil twin’ in-flight Wi-Fi used to steal infoKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agotheregister.com0
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)thomask@lemmy.sdf.org to Cybersecurity@sh.itjust.works – 1 points – 3 months agoqualys.com0
Dev rejects CVE severity, makes his GitHub repo read-onlyNemeski@lemm.ee to Cybersecurity@sh.itjust.works – 1 points – 3 months agobleepingcomputer.com0
Hackers exploit critical D-Link DIR-859 router flaw to steal passwordsBrikoX@lemmy.zip to Cybersecurity@sh.itjust.works – 1 points – 3 months agobleepingcomputer.com0
Meet Brain Cipher — The new ransomware behind Indonesia's data center attackBrikoX@lemmy.zip to Cybersecurity@sh.itjust.works – 1 points – 3 months agobleepingcomputer.com0
Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operatorBrikoX@lemmy.zip to Cybersecurity@sh.itjust.works – 1 points – 3 months agobleepingcomputer.com0
Google cuts ties with Entrust in Chrome over trust issuesKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agotheregister.com0
'Poseidon' Mac stealer distributed via Google adsKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agomalwarebytes.com0
GitLab vulnerability permits running pipeline tasks under another userKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agostackdiary.com0
CISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube VulnerabilitiesKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agosecurityweek.com0
New Unfurling Hemlock threat actor floods systems with malwareKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agobleepingcomputer.com0
TeamViewer investigating intrusion of corporate IT environmentKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agotherecord.media0
Philippines Data Security Officer Hacked 93 Different SitesLanky_Pomegranate530@midwest.social to Cybersecurity@sh.itjust.works – 1 points – 3 months agothecyberexpress.com0
Apple AirPods Bug Allows EavesdroppingKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agodarkreading.com0
Federal Reserve "breached" data may actually belong to Evolve BankKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agomalwarebytes.com0
Google TAG details nightmare whack-a-mole with Dragonbridge disinfo groupKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agoscmagazine.com0
Resurgent malware targets Outlook and Thunderbird users but bypasses RussiaKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agocybernews.com0
Chinese State Actors Use Ransomware to Conceal Real IntentKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agoinfosecurity-magazine.com0
Dangerous AI Workaround: 'Skeleton Key' Unlocks Malicious ContentKid@sh.itjust.works to Cybersecurity@sh.itjust.works – 1 points – 3 months agodarkreading.com0
Critical MOVEit vulnerability puts huge swaths of the Internet at severe riskHellfire103@lemmy.ca to Cybersecurity@sh.itjust.works – 1 points – 3 months agoarstechnica.com0