Joker@sh.itjust.works · edit-26 hours agoAndrew Tate's The Real World breached.plus-squareddosecrets.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down14
arrow-up117arrow-down1external-linkAndrew Tate's The Real World breached.plus-squareddosecrets.comJoker@sh.itjust.works · edit-26 hours agomessage-square0fedilink
Joker@sh.itjust.works · 18 hours agoKC Man Indicted for Computer Hackingplus-squarewww.justice.govexternal-linkmessage-square3fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkKC Man Indicted for Computer Hackingplus-squarewww.justice.govJoker@sh.itjust.works · 18 hours agomessage-square3fedilink
Joker@sh.itjust.works · 19 hours agoEnhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in imagesplus-squarecybersecurity.springeropen.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEnhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in imagesplus-squarecybersecurity.springeropen.comJoker@sh.itjust.works · 19 hours agomessage-square0fedilink
Joker@sh.itjust.works · 19 hours agoThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comJoker@sh.itjust.works · 19 hours agomessage-square0fedilink
Joker@sh.itjust.works · edit-21 day agoLateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examplesplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkLateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examplesplus-squareunit42.paloaltonetworks.comJoker@sh.itjust.works · edit-21 day agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoMicrosoft seizes 240 websites used by Egyptian phishing-as-a-service operation.plus-squareblogs.microsoft.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkMicrosoft seizes 240 websites used by Egyptian phishing-as-a-service operation.plus-squareblogs.microsoft.comJoker@sh.itjust.works · 2 days agomessage-square1fedilink
shellsharks@infosec.pubM · 3 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square7fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 3 days agomessage-square7fedilink
Joker@sh.itjust.works · 2 days agoRussia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPYplus-squarewww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkRussia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPYplus-squarewww.recordedfuture.comJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoThe Philippine army is recruiting young tech civilians to fight cyber attacksplus-squarerestofworld.orgexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkThe Philippine army is recruiting young tech civilians to fight cyber attacksplus-squarerestofworld.orgJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoFinancially Motivated Threat Actor Leveraged Google Docs and Weebly Services to Target Telecom and Financial Sectorsplus-squareblog.eclecticiq.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkFinancially Motivated Threat Actor Leveraged Google Docs and Weebly Services to Target Telecom and Financial Sectorsplus-squareblog.eclecticiq.comJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoJustice Department Seizes Cybercrime Website and Charges Its Administratorsplus-squarewww.justice.govexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkJustice Department Seizes Cybercrime Website and Charges Its Administratorsplus-squarewww.justice.govJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoUnveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirineplus-squarewww.welivesecurity.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkUnveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirineplus-squarewww.welivesecurity.comJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days ago2024 CWE Top 25 Most Dangerous Software Weaknessesplus-squarecwe.mitre.orgexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-link2024 CWE Top 25 Most Dangerous Software Weaknessesplus-squarecwe.mitre.orgJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoDPRK IT Workers | A Network of Active Front Companies and Their Links to Chinaplus-squarewww.sentinelone.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkDPRK IT Workers | A Network of Active Front Companies and Their Links to Chinaplus-squarewww.sentinelone.comJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoBlack Friday Spam Report 2024: 3 in 4 Spam Emails Are Scams, Bitdefender Antispam Lab Warnsplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBlack Friday Spam Report 2024: 3 in 4 Spam Emails Are Scams, Bitdefender Antispam Lab Warnsplus-squarewww.bitdefender.comJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Joker@sh.itjust.works · 2 days agoFuture of Cybersecurity: Leadership Needed to Fully Define Quantum Threat Mitigation Strategyplus-squarewww.gao.govexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkFuture of Cybersecurity: Leadership Needed to Fully Define Quantum Threat Mitigation Strategyplus-squarewww.gao.govJoker@sh.itjust.works · 2 days agomessage-square0fedilink
Branquinho@lemmy.eco.br · 5 days agoSecurity Update - Release 1.32.5 · dani-garcia/vaultwardenplus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkSecurity Update - Release 1.32.5 · dani-garcia/vaultwardenplus-squaregithub.comBranquinho@lemmy.eco.br · 5 days agomessage-square1fedilink
shellsharks@infosec.pubM · 5 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square2fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 5 days agomessage-square2fedilink
shellsharks@infosec.pubM · 10 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square3fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 10 days agomessage-square3fedilink
Branquinho@lemmy.eco.br · 12 days agoRelease 1.32.4 · dani-garcia/vaultwardenplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRelease 1.32.4 · dani-garcia/vaultwardenplus-squaregithub.comBranquinho@lemmy.eco.br · 12 days agomessage-square0fedilink