Resident Pulser@infosec.pubBEnglish · 6 hours agoRecord DDoS pummels site with once-unimaginable 7.3Tbps of junk trafficplus-squarearstechnica.comexternal-linkmessage-square2linkfedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkRecord DDoS pummels site with once-unimaginable 7.3Tbps of junk trafficplus-squarearstechnica.comResident Pulser@infosec.pubBEnglish · 6 hours agomessage-square2linkfedilink
Resident Pulser@infosec.pubBEnglish · 6 hours agoHackers Post Dozens of Malicious Copycat Repos to GitHubplus-squarewww.darkreading.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHackers Post Dozens of Malicious Copycat Repos to GitHubplus-squarewww.darkreading.comResident Pulser@infosec.pubBEnglish · 6 hours agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 6 hours agoBreaking WebAuthn, FIDO2, and Forging Passkeysplus-squarewww.nullpt.rsexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBreaking WebAuthn, FIDO2, and Forging Passkeysplus-squarewww.nullpt.rsResident Pulser@infosec.pubBEnglish · 6 hours agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 23 hours agoWho’s guarding the AI? Even security teams are bypassing oversightplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWho’s guarding the AI? Even security teams are bypassing oversightplus-squarewww.helpnetsecurity.comResident Pulser@infosec.pubBEnglish · 23 hours agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 22 hours agoNo, the 16 billion credentials leak is not a new data breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNo, the 16 billion credentials leak is not a new data breachplus-squarewww.bleepingcomputer.comResident Pulser@infosec.pubBEnglish · 22 hours agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 1 day agoResearchers discovered the largest data breach ever, exposing 16 billion login credentialsplus-squaresecurityaffairs.comexternal-linkmessage-square0linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkResearchers discovered the largest data breach ever, exposing 16 billion login credentialsplus-squaresecurityaffairs.comResident Pulser@infosec.pubBEnglish · 1 day agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoAI Now Generates Majority of Spam and Malicious Emailsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square12linkfedilinkarrow-up176arrow-down11
arrow-up175arrow-down1external-linkAI Now Generates Majority of Spam and Malicious Emailsplus-squarewww.infosecurity-magazine.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square12linkfedilink
Resident Pulser@infosec.pubBEnglish · 1 day agoGodfather Android malware now uses virtualization to hijack banking appsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGodfather Android malware now uses virtualization to hijack banking appsplus-squarewww.bleepingcomputer.comResident Pulser@infosec.pubBEnglish · 1 day agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoWebsites are tracking you via browser fingerprinting, researchers showplus-squaretechxplore.comexternal-linkmessage-square6linkfedilinkarrow-up143arrow-down10
arrow-up143arrow-down1external-linkWebsites are tracking you via browser fingerprinting, researchers showplus-squaretechxplore.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square6linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoThieves don’t need your car keys, just a wireless signalplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThieves don’t need your car keys, just a wireless signalplus-squarewww.helpnetsecurity.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoGPS tracker detection made easy with off-the-shelf hardwareplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkGPS tracker detection made easy with off-the-shelf hardwareplus-squarewww.helpnetsecurity.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days ago91% noise: A look at what’s wrong with traditional SAST toolsplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-link91% noise: A look at what’s wrong with traditional SAST toolsplus-squarewww.helpnetsecurity.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoThe DOJ announces the seizure of $225.3M in crypto linked to "pig butchering" scams, marking "the largest cryptocurrency seizure in US Secret Service history" (MacKenzie Sigalos/CNBC)plus-squarewww.techmeme.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkThe DOJ announces the seizure of $225.3M in crypto linked to "pig butchering" scams, marking "the largest cryptocurrency seizure in US Secret Service history" (MacKenzie Sigalos/CNBC)plus-squarewww.techmeme.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoIsrael-Tied Predatory Sparrow Hackers Are Waging Cyberwar on Iran’s Financial Systemplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkIsrael-Tied Predatory Sparrow Hackers Are Waging Cyberwar on Iran’s Financial Systemplus-squarewww.wired.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoGoogle’s Gerrit Code Platform Vulnerability Allows Hack of 18 Google Projects Including ChromiumOSplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGoogle’s Gerrit Code Platform Vulnerability Allows Hack of 18 Google Projects Including ChromiumOSplus-squarecybersecuritynews.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoUBS confirms data was stolen in a cyberattack on supplier Chain IQ, which said it and 19 other companies were targeted; Swiss media says it impacts 130K+ staff (Noele Illien/Bloomberg)plus-squarewww.techmeme.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkUBS confirms data was stolen in a cyberattack on supplier Chain IQ, which said it and 19 other companies were targeted; Swiss media says it impacts 130K+ staff (Noele Illien/Bloomberg)plus-squarewww.techmeme.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoFake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ dataplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkFake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ dataplus-squareresearch.checkpoint.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 3 days agoResearchers unearth keyloggers on Outlook login pagesplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up128arrow-down11
arrow-up127arrow-down1external-linkResearchers unearth keyloggers on Outlook login pagesplus-squarewww.helpnetsecurity.comResident Pulser@infosec.pubBEnglish · 3 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 2 days agoChaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)plus-squarewww.helpnetsecurity.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkChaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)plus-squarewww.helpnetsecurity.comResident Pulser@infosec.pubBEnglish · 2 days agomessage-square0linkfedilink
Resident Pulser@infosec.pubBEnglish · 4 days agoProtecting Minors Online Must Not Come at the Cost of Privacy and Free Expressionplus-squarewww.eff.orgexternal-linkmessage-square1linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkProtecting Minors Online Must Not Come at the Cost of Privacy and Free Expressionplus-squarewww.eff.orgResident Pulser@infosec.pubBEnglish · 4 days agomessage-square1linkfedilink