PhilipTheBucket@ponder.catEnglish · 12 hours agoMassive data leak: Ukrainian IDs, other documents exposed by years of cyber negligencekyivindependent.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkMassive data leak: Ukrainian IDs, other documents exposed by years of cyber negligencekyivindependent.comPhilipTheBucket@ponder.catEnglish · 12 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoCanada launches breach risk self-assessment online tool - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkCanada launches breach risk self-assessment online tool - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoHackers abuse WordPress MU-Plugins to hide malicious codeplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkHackers abuse WordPress MU-Plugins to hide malicious codeplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoHacker Leaks Samsung Customer Dataplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkHacker Leaks Samsung Customer Dataplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoSam’s Club Investigates Alleged Cl0p Ransomware Breachplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkSam’s Club Investigates Alleged Cl0p Ransomware Breachplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoPhishing platform 'Lucid' behind wave of iOS, Android SMS attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkPhishing platform 'Lucid' behind wave of iOS, Android SMS attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoCVE-2025-22398: Dell Unity Hit by 9.8 CVSS Root-Level Command Injection Flawplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCVE-2025-22398: Dell Unity Hit by 9.8 CVSS Root-Level Command Injection Flawplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoFresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europeplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkFresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europeplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoCISA reveals new malware variant used on compromised Ivanti Connect Secure devices - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCISA reveals new malware variant used on compromised Ivanti Connect Secure devices - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoChina-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusionsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkChina-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusionsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoCheck Point Acknowledges Data Breach, Claims Information is 'Oldplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCheck Point Acknowledges Data Breach, Claims Information is 'Oldplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 19 hours agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · edit-22 days agoOracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS serviceplus-squaredoublepulsar.comexternal-linkmessage-square1fedilinkarrow-up130arrow-down10
arrow-up130arrow-down1external-linkOracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS serviceplus-squaredoublepulsar.comBrikoX@lemmy.zipEnglish · edit-22 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoOracle Still Denies Breach as Researchers Persistplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkOracle Still Denies Breach as Researchers Persistplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoFake Zoom, Real Ransom: Nine-Day Malware Intrusion Ends with BlackSuit Ransomware Blastplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkFake Zoom, Real Ransom: Nine-Day Malware Intrusion Ends with BlackSuit Ransomware Blastplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoGPU-Powered Evasion: Unpacking the Sophisticated CoffeeLoader Malwareplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkGPU-Powered Evasion: Unpacking the Sophisticated CoffeeLoader Malwareplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoWas Check Point hacked? Security firm calls ransom demands old newsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkWas Check Point hacked? Security firm calls ransom demands old newsplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
cyrano@lemmy.dbzer0.comEnglish · 4 days agoTwitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Jobplus-squarehackread.comexternal-linkmessage-square5fedilinkarrow-up1211arrow-down10
arrow-up1211arrow-down1external-linkTwitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Jobplus-squarehackread.comcyrano@lemmy.dbzer0.comEnglish · 4 days agomessage-square5fedilink
cyrano@lemmy.dbzer0.comEnglish · 3 days agoPrivacy disaster as LGBTQ+ and BDSM dating apps leak private photos.plus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up156arrow-down10
arrow-up156arrow-down1external-linkPrivacy disaster as LGBTQ+ and BDSM dating apps leak private photos.plus-squarecybernews.comcyrano@lemmy.dbzer0.comEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoPhaaS actor uses DoH and DNS MX to dynamically distribute phishingplus-squareblogs.infoblox.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkPhaaS actor uses DoH and DNS MX to dynamically distribute phishingplus-squareblogs.infoblox.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoAnalysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques - CYFIRMAplus-squarewww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnalysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques - CYFIRMAplus-squarewww.cyfirma.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink