itwasntme223@infosec.pub · edit-25 hours agoHow to Set Up Your Online Identity on Keyoxide: A Simple Guideplus-squareblog.epic-worlds.comexternal-linkmessage-square5fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkHow to Set Up Your Online Identity on Keyoxide: A Simple Guideplus-squareblog.epic-worlds.comitwasntme223@infosec.pub · edit-25 hours agomessage-square5fedilink
itwasntme223@infosec.pub · 5 hours agoSnopes Twitter got hacked. Twitter screws up the responseplus-squareinfosec.exchangeexternal-linkmessage-square3fedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkSnopes Twitter got hacked. Twitter screws up the responseplus-squareinfosec.exchangeitwasntme223@infosec.pub · 5 hours agomessage-square3fedilink
Tea@programming.dev · edit-215 hours agoUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comexternal-linkmessage-square10fedilinkarrow-up198arrow-down18
arrow-up190arrow-down1external-linkUndocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.plus-squarewww.tarlogic.comTea@programming.dev · edit-215 hours agomessage-square10fedilink
cm0002@lemmy.world · 2 days agoUndocumented backdoor found in Bluetooth chip used by a billion devicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up135arrow-down12
arrow-up133arrow-down1external-linkUndocumented backdoor found in Bluetooth chip used by a billion devicesplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 2 days agomessage-square1fedilink
cm0002@lemmy.world · 2 days agoYouTubers extorted via copyright strikes to spread malwareplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkYouTubers extorted via copyright strikes to spread malwareplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 2 days agomessage-square0fedilink
Fitik@fedia.io · 2 days agoHacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court orderplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkHacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court orderplus-squaretechcrunch.comFitik@fedia.io · 2 days agomessage-square0fedilink
cm0002@lemmy.world · 3 days agoInvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkInvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationsplus-squarecybersecuritynews.comcm0002@lemmy.world · 3 days agomessage-square0fedilink
Tea@programming.dev · 4 days agoMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMalvertising campaign leads to info stealers hosted on GitHub.plus-squarewww.microsoft.comTea@programming.dev · 4 days agomessage-square0fedilink
Tea@programming.dev · 5 days agoI spoke to a task scammer. Here's how it went.plus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up138arrow-down11
arrow-up137arrow-down1external-linkI spoke to a task scammer. Here's how it went.plus-squarewww.malwarebytes.comTea@programming.dev · 5 days agomessage-square0fedilink
Tony Bark@pawb.social · 5 days agoFormer top NSA cyber official: Probationary firings ‘devastating’ to cyber, national securityplus-squarecyberscoop.comexternal-linkmessage-square2fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkFormer top NSA cyber official: Probationary firings ‘devastating’ to cyber, national securityplus-squarecyberscoop.comTony Bark@pawb.social · 5 days agomessage-square2fedilink
Tea@programming.dev · 3 days agoExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkExposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.plus-squarehunt.ioTea@programming.dev · 3 days agomessage-square0fedilink
Tea@programming.dev · edit-24 days agoViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkViolent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.plus-squarewww.ic3.govTea@programming.dev · edit-24 days agomessage-square0fedilink
Tea@programming.dev · 4 days agoUnmasking the new persistent attacks on Japan.plus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkUnmasking the new persistent attacks on Japan.plus-squareblog.talosintelligence.comTea@programming.dev · 4 days agomessage-square0fedilink
shellsharks@infosec.pubM · 3 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square2fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 3 days agomessage-square2fedilink
Tea@programming.dev · edit-24 days agoStealers and backdoors are spreading under the guise of a DeepSeek client.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkStealers and backdoors are spreading under the guise of a DeepSeek client.plus-squaresecurelist.comTea@programming.dev · edit-24 days agomessage-square0fedilink
Tea@programming.dev · edit-25 days agoUndercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkUndercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.plus-squaresecurelist.comTea@programming.dev · edit-25 days agomessage-square0fedilink
shellsharks@infosec.pubM · 5 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square2fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 5 days agomessage-square2fedilink
Tea@programming.dev · 5 days agoSilk Typhoon targeting IT supply chain.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSilk Typhoon targeting IT supply chain.plus-squarewww.microsoft.comTea@programming.dev · 5 days agomessage-square0fedilink
Tony Bark@pawb.social · edit-26 days agoRansomware scum abusing Microsoft Windows-signed driverplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkRansomware scum abusing Microsoft Windows-signed driverplus-squarewww.theregister.comTony Bark@pawb.social · edit-26 days agomessage-square0fedilink
shellsharks@infosec.pubM · 5 days agoScrolls - A "Newsletter" with some Cybersecurity stuffplus-squaremessage-squaremessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1message-squareScrolls - A "Newsletter" with some Cybersecurity stuffplus-squareshellsharks@infosec.pubM · 5 days agomessage-square0fedilink