cm0002@lemmy.world · 12 minutes agoPro-Iran hacktivists borrow from Russia's cyber playbookplus-squarewww.axios.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPro-Iran hacktivists borrow from Russia's cyber playbookplus-squarewww.axios.comcm0002@lemmy.world · 12 minutes agomessage-square0fedilink
cm0002@lemmy.world · 5 hours agoUS disrupts North Korean IT worker "laptop farm" scheme in 16 statesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkUS disrupts North Korean IT worker "laptop farm" scheme in 16 statesplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 5 hours agomessage-square1fedilink
Pro@reddthat.com · 3 hours agoJasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizationsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkJasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizationsplus-squarewww.microsoft.comPro@reddthat.com · 3 hours agomessage-square0fedilink
cm0002@lemmy.world · 5 hours agoNew FileFix attack runs JScript while bypassing Windows MoTW alertsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNew FileFix attack runs JScript while bypassing Windows MoTW alertsplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 5 hours agomessage-square0fedilink
cm0002@lemmy.world · 9 hours agoBreak The Air Gap With Ultrasoundplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBreak The Air Gap With Ultrasoundplus-squarehackaday.comcm0002@lemmy.world · 9 hours agomessage-square0fedilink
cm0002@lemmy.world · 1 day agoHikvision Canada ordered to cease operations over security risksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHikvision Canada ordered to cease operations over security risksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 1 day agomessage-square0fedilink
SayCyberOnceMore@feddit.uk · 1 day agoStumbled on to StormShield - opinions?plus-squarewww.stormshield.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkStumbled on to StormShield - opinions?plus-squarewww.stormshield.comSayCyberOnceMore@feddit.uk · 1 day agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.org · 2 days agoQilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UKplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkQilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UKplus-squarehackread.comHotznplotzn@lemmy.sdf.org · 2 days agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.org · 3 days agoCanada orders China's Hikvision to close Canadian operations over national security concernsplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCanada orders China's Hikvision to close Canadian operations over national security concernsplus-squarewww.reuters.comHotznplotzn@lemmy.sdf.org · 3 days agomessage-square0fedilink
cm0002@lemmy.world · 4 days agoCitrix Bleed 2 flaw now believed to be exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCitrix Bleed 2 flaw now believed to be exploited in attacksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 4 days agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.org · 5 days agoAuthoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studyplus-squarewww.swp-berlin.orgexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAuthoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studyplus-squarewww.swp-berlin.orgHotznplotzn@lemmy.sdf.org · 5 days agomessage-square0fedilink
Pro@programming.dev · 4 days agoCriminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudplus-squarewww.ic3.govexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCriminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudplus-squarewww.ic3.govPro@programming.dev · 4 days agomessage-square0fedilink
shellsharks@infosec.pubM · 5 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 5 days agomessage-square0fedilink
Pro@programming.dev · 4 days agomommy Access Brokerintel471.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkmommy Access Brokerintel471.comPro@programming.dev · 4 days agomessage-square0fedilink
shellsharks@infosec.pubM · 6 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square4fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 6 days agomessage-square4fedilink
Pro@programming.dev · 6 days agoIn the Wild: Malware Prototype with Embedded Prompt Injectionplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkIn the Wild: Malware Prototype with Embedded Prompt Injectionplus-squareresearch.checkpoint.comPro@programming.dev · 6 days agomessage-square0fedilink
Pro@programming.dev · 6 days agoIranian Educated Manticore Targets Leading Tech Academicsplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkIranian Educated Manticore Targets Leading Tech Academicsplus-squareresearch.checkpoint.comPro@programming.dev · 6 days agomessage-square0fedilink
cm0002@lemmy.world · 7 days agoDon't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attackplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down11
arrow-up120arrow-down1external-linkDon't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attackplus-squarewww.theregister.comcm0002@lemmy.world · 7 days agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.org · 8 days agoChina: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19plus-squarewww.article19.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkChina: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19plus-squarewww.article19.orgHotznplotzn@lemmy.sdf.org · 8 days agomessage-square0fedilink
Hotznplotzn@lemmy.sdf.org · 8 days agoChina-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devicesplus-squaresecurityscorecard.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkChina-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devicesplus-squaresecurityscorecard.comHotznplotzn@lemmy.sdf.org · 8 days agomessage-square0fedilink