Joker@sh.itjust.worksEnglish · 1 day agoFake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attackplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkFake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attackplus-squareunit42.paloaltonetworks.comJoker@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 24 hours agoSimple Include Statement Hides Casino Spamplus-squareblog.sucuri.netexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSimple Include Statement Hides Casino Spamplus-squareblog.sucuri.netJoker@sh.itjust.worksEnglish · 24 hours agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 3 days agoJoint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructureplus-squarewww.cisa.govexternal-linkmessage-square7fedilinkarrow-up148arrow-down10
arrow-up148arrow-down1external-linkJoint Statement from FBI and CISA on the People's Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructureplus-squarewww.cisa.govJoker@sh.itjust.worksEnglish · 3 days agomessage-square7fedilink
Joker@sh.itjust.worksEnglish · 1 day agoInside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppersplus-squareblog.eclecticiq.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkInside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppersplus-squareblog.eclecticiq.comJoker@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 2 days agoMalware being delivered by mail, warns Swiss cyber agencyplus-squaretherecord.mediaexternal-linkmessage-square2fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkMalware being delivered by mail, warns Swiss cyber agencyplus-squaretherecord.mediaJoker@sh.itjust.worksEnglish · 2 days agomessage-square2fedilink
Joker@sh.itjust.worksEnglish · 2 days agoAdvertisers are pushing ad and pop-up blockers using old tricksplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up131arrow-down10
arrow-up131arrow-down1external-linkAdvertisers are pushing ad and pop-up blockers using old tricksplus-squarewww.malwarebytes.comJoker@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoChatGPT allows access to underlying sandbox OS, “playbook” dataplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkChatGPT allows access to underlying sandbox OS, “playbook” dataplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 2 days agoHungary confirms hack of defense procurement agencyplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkHungary confirms hack of defense procurement agencyplus-squaretherecord.mediaJoker@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 2 days agoCVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wildwww.clearskysec.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkCVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wildwww.clearskysec.comJoker@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoLeaked info of 122 million linked to B2B data aggregator breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkLeaked info of 122 million linked to B2B data aggregator breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 2 days agoEvaluating Synthetic Command Attacks on Smart Voice Assistantsplus-squarearxiv.orgexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkEvaluating Synthetic Command Attacks on Smart Voice Assistantsplus-squarearxiv.orgJoker@sh.itjust.worksEnglish · 2 days agomessage-square1fedilink
Joker@sh.itjust.worksEnglish · 2 days agoStrela Stealer: Today's invoice is tomorrow's phishplus-squaresecurityintelligence.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkStrela Stealer: Today's invoice is tomorrow's phishplus-squaresecurityintelligence.comJoker@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoChipmaker Patch Tuesday: Intel Publishes 44 and AMD Publishes 8 New Advisoriesplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkChipmaker Patch Tuesday: Intel Publishes 44 and AMD Publishes 8 New Advisoriesplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoEmbargo ransomware claims breach of US pharmacy networkplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkEmbargo ransomware claims breach of US pharmacy networkplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 2 days agoNew Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9plus-squareblog.xlab.qianxin.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9plus-squareblog.xlab.qianxin.comJoker@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · edit-22 days agoNew PXA Stealer targets government and education sectors for sensitive informationplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew PXA Stealer targets government and education sectors for sensitive informationplus-squareblog.talosintelligence.comJoker@sh.itjust.worksEnglish · edit-22 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · 3 days agoNIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikelyplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkNIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikelyplus-squaretherecord.mediaJoker@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoHive0145 Targets Europe with Advanced Strela Stealer Campaignsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHive0145 Targets Europe with Advanced Strela Stealer Campaignsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Joker@sh.itjust.worksEnglish · edit-22 days agoCrimeware and financial predictions for 2025plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkCrimeware and financial predictions for 2025plus-squaresecurelist.comJoker@sh.itjust.worksEnglish · edit-22 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoRussian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emailsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkRussian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emailsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink