Kid@sh.itjust.worksMEnglish · 2 days agoChinese hackers use custom malware to spy on US telecom networksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkChinese hackers use custom malware to spy on US telecom networksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoDeepSeek found to be sharing user data with TikTok parent company ByteDanceplus-squarewww.malwarebytes.comexternal-linkmessage-square28fedilinkarrow-up179arrow-down110
arrow-up169arrow-down1external-linkDeepSeek found to be sharing user data with TikTok parent company ByteDanceplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square28fedilink
Cat@ponder.catEnglish · edit-21 day ago[Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.plus-squareopenai.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link[Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.plus-squareopenai.comCat@ponder.catEnglish · edit-21 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMalware hides on Google docs: passwords and private chats at riskplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkMalware hides on Google docs: passwords and private chats at riskplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoGoogle now allows digital fingerprinting of its usersplus-squarewww.malwarebytes.comexternal-linkmessage-square43fedilinkarrow-up1184arrow-down10
arrow-up1184arrow-down1external-linkGoogle now allows digital fingerprinting of its usersplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square43fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoEuropol Cracks Down on European Document Forgery and Smuggling Ringplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkEuropol Cracks Down on European Document Forgery and Smuggling Ringplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoPegasus Spyware Used Widely to Target Individuals in Private Industry & Finance Sectorsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkPegasus Spyware Used Widely to Target Individuals in Private Industry & Finance Sectorsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Cat@ponder.catEnglish · edit-21 day agoDeceptiveDevelopment targets freelance developers.plus-squarewww.welivesecurity.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkDeceptiveDevelopment targets freelance developers.plus-squarewww.welivesecurity.comCat@ponder.catEnglish · edit-21 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoOver 1.6 million records from clinical trial database exposedplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkOver 1.6 million records from clinical trial database exposedplus-squarecybernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 2 days agoRussian hackers target Signal accounts in growing espionage effortplus-squarekyivindependent.comexternal-linkmessage-square3fedilinkarrow-up173arrow-down10
arrow-up173arrow-down1external-linkRussian hackers target Signal accounts in growing espionage effortplus-squarekyivindependent.comPhilipTheBucket@ponder.catEnglish · 2 days agomessage-square3fedilink
PhilipTheBucket@ponder.catEnglish · 3 days agoBeverly Hills Plastic Surgeon Sued for Not Telling Patients Hackers Stole Their Nude Photosplus-squarewww.404media.coexternal-linkmessage-square7fedilinkarrow-up1111arrow-down12
arrow-up1109arrow-down1external-linkBeverly Hills Plastic Surgeon Sued for Not Telling Patients Hackers Stole Their Nude Photosplus-squarewww.404media.coPhilipTheBucket@ponder.catEnglish · 3 days agomessage-square7fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoCyber Threat Actors Leveraging Exploits To Attack Financial Sector With Advanced Malwareplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkCyber Threat Actors Leveraging Exploits To Attack Financial Sector With Advanced Malwareplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoAtlassian fixed critical flaws in Confluence and Crowdplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkAtlassian fixed critical flaws in Confluence and Crowdplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 days agoBlack Basta ransomware gang's internal chat logs leak onlineplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkBlack Basta ransomware gang's internal chat logs leak onlineplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0fedilink
floofloof@lemmy.caEnglish · 3 days agoDOGE Now Has Access to the Top US Cybersecurity Agencyplus-squarewww.wired.comexternal-linkmessage-square13fedilinkarrow-up163arrow-down11
arrow-up162arrow-down1external-linkDOGE Now Has Access to the Top US Cybersecurity Agencyplus-squarewww.wired.comfloofloof@lemmy.caEnglish · 3 days agomessage-square13fedilink
Cat@ponder.catEnglish · edit-22 days agoNew wave of targeted attacks of the Angry Likho APT on Russian organizations.plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkNew wave of targeted attacks of the Angry Likho APT on Russian organizations.plus-squaresecurelist.comCat@ponder.catEnglish · edit-22 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoHard drives containing sensitive medical data found in flea marketplus-squarewww.malwarebytes.comexternal-linkmessage-square19fedilinkarrow-up1218arrow-down11
arrow-up1217arrow-down1external-linkHard drives containing sensitive medical data found in flea marketplus-squarewww.malwarebytes.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square19fedilink
blackberry@midwest.socialEnglish · 3 days agoHow to scan PDF files for malware?plus-squaremessage-squaremessage-square6fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1message-squareHow to scan PDF files for malware?plus-squareblackberry@midwest.socialEnglish · 3 days agomessage-square6fedilink
PhilipTheBucket@ponder.catEnglish · 3 days agoTwo critical vulnerabilities lead to stolen MongoDB data, RCEplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down11
arrow-up114arrow-down1external-linkTwo critical vulnerabilities lead to stolen MongoDB data, RCEplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCybercriminals shift focus to social media as attacks reach historic highsplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkCybercriminals shift focus to social media as attacks reach historic highsplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink