Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 39 minutes agoHacker Claims Twilio's SendGrid Data Breach, Selling 848,000 Recordsplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacker Claims Twilio's SendGrid Data Breach, Selling 848,000 Recordsplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 39 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 41 minutes agoRecent GitHub supply chain attack traced to leaked SpotBugs tokenplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRecent GitHub supply chain attack traced to leaked SpotBugs tokenplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 41 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 43 minutes agoChina’s FamousSparrow APT Hits Americas with SparrowDoor Malwareplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChina’s FamousSparrow APT Hits Americas with SparrowDoor Malwareplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 43 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 43 minutes agoGoogle Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuseplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuseplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 43 minutes agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoRoyal Mail investigates data leak claims, no impact on operationsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRoyal Mail investigates data leak claims, no impact on operationsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agoOpen-source malware doubles, data exfiltration attacks dominate - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpen-source malware doubles, data exfiltration attacks dominate - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 hours agoNSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat | CISAplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat | CISAplus-squarewww.cisa.govKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agoTriada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devicesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTriada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devicesplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoHacking the Call Records of Millions of Americansplus-squareevanconnelly.github.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking the Call Records of Millions of Americansplus-squareevanconnelly.github.ioKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoReport: Oracle Staff Tell Some Clients Hacker Stole Login Credentials | PYMNTS.complus-squarewww.pymnts.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReport: Oracle Staff Tell Some Clients Hacker Stole Login Credentials | PYMNTS.complus-squarewww.pymnts.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoOver 500 Phishing Domains Emerge Following Bybit Heistplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 500 Phishing Domains Emerge Following Bybit Heistplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoHackers Exploit Cloudflare for Advanced Phishing Attacksplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Exploit Cloudflare for Advanced Phishing Attacksplus-squaregbhackers.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoSophisticated QR Code Phishing Attack Targeting Microsoft 365 Users to Steal Loginsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSophisticated QR Code Phishing Attack Targeting Microsoft 365 Users to Steal Loginsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agoiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkiPhones Aren’t Breach-Proof: Debunking the Myth of iOS Securityplus-squaresolcyber.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 8 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day ago"Nudify" deepfakes stored unprotected onlineplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link"Nudify" deepfakes stored unprotected onlineplus-squarewww.malwarebytes.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoOver 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaignplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaignplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNorth Korean IT worker army expands operations in Europeplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean IT worker army expands operations in Europeplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoMalaysian Airport's Cyber Disruption a Warning for Asiaplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalaysian Airport's Cyber Disruption a Warning for Asiaplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoOnly 1% of malicious emails that reach inboxes deliver malware - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOnly 1% of malicious emails that reach inboxes deliver malware - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNearly 24,000 IPs behind wave of Palo Alto Global Protect scansplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNearly 24,000 IPs behind wave of Palo Alto Global Protect scansplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square0fedilink