Kid@sh.itjust.worksMEnglish · 5 hours agoRussian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411) - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square5fedilinkarrow-up122arrow-down15
arrow-up117arrow-down1external-linkRussian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411) - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoNetgear warns users to patch critical WiFi router vulnerabilitiesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNetgear warns users to patch critical WiFi router vulnerabilitiesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours ago0-Day Vulnerabilities in Microsoft Sysinternals Tools Allow Attackers To Launch DLL Injection Attacks on Windowsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-link0-Day Vulnerabilities in Microsoft Sysinternals Tools Allow Attackers To Launch DLL Injection Attacks on Windowsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoDaggerFly-Linked Linux Malware Targets Network Appliancesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkDaggerFly-Linked Linux Malware Targets Network Appliancesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoAsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoSophisticated Phishing Attack Bypasses Microsoft ADFS MFAplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSophisticated Phishing Attack Bypasses Microsoft ADFS MFAplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoVidSpam: A New Threat Emerges as Bitcoin Scams Evolve from Images to Video | Proofpoint USplus-squarewww.proofpoint.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVidSpam: A New Threat Emerges as Bitcoin Scams Evolve from Images to Video | Proofpoint USplus-squarewww.proofpoint.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoGuidance and Strategies to Protect Network Edge Devices | CISAplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGuidance and Strategies to Protect Network Edge Devices | CISAplus-squarewww.cisa.govKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoCredential Theft Becomes Cybercriminals' Favorite Targetplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCredential Theft Becomes Cybercriminals' Favorite Targetplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoAnalyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst | FortiGuard Labsplus-squarewww.fortinet.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAnalyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst | FortiGuard Labsplus-squarewww.fortinet.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoStealers on the Rise: A Closer Look at a Growing macOS Threatplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkStealers on the Rise: A Closer Look at a Growing macOS Threatplus-squareunit42.paloaltonetworks.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 hours agoMicrosoft fixes CVSS 9.9 vulnerability in Azure AI Face serviceplus-squarewww.scworld.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft fixes CVSS 9.9 vulnerability in Azure AI Face serviceplus-squarewww.scworld.comKid@sh.itjust.worksMEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoCVE-2025-23114 (CVSS 9.0): Critical Veeam Backup Vulnerability Enables Remote Code Executionplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2025-23114 (CVSS 9.0): Critical Veeam Backup Vulnerability Enables Remote Code Executionplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoGoogle fixes Android kernel zero-day exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkGoogle fixes Android kernel zero-day exploited in attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square3fedilink
PhilipTheBucket@ponder.catEnglish · 1 day agoWirral NHS cyberattack leads to missed cancer care targetsplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkWirral NHS cyberattack leads to missed cancer care targetsplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoDeepSeek AI tools impersonated by infostealer malware on PyPIplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkDeepSeek AI tools impersonated by infostealer malware on PyPIplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day ago768 CVEs Exploited in the Wild in 2024plus-squarewww.infosecurity-magazine.comexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-link768 CVEs Exploited in the Wild in 2024plus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoInside APT34 (OilRig): Tools, Techniques, and Global Cyber Threatsplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkInside APT34 (OilRig): Tools, Techniques, and Global Cyber Threatsplus-squarewww.trustwave.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoPyPI adds project archiving system to stop malicious updatesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up126arrow-down12
arrow-up124arrow-down1external-linkPyPI adds project archiving system to stop malicious updatesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMicrosoft Teams: Email bombing and voice phishingb2b-cyber-security.deexternal-linkmessage-square1fedilinkarrow-up19arrow-down12
arrow-up17arrow-down1external-linkMicrosoft Teams: Email bombing and voice phishingb2b-cyber-security.deKid@sh.itjust.worksMEnglish · 2 days agomessage-square1fedilink