cm0002@lemmy.world · 5 months agoPostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacksplus-squarethehackernews.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
shellsharks@infosec.pubM · 5 months agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 5 months agomessage-square0fedilink
Cat@ponder.cat · 5 months agoThe BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.plus-squarewww.microsoft.comCat@ponder.cat · 5 months agomessage-square0fedilink
shellsharks@infosec.pubM · 5 months agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 5 months agomessage-square0fedilink
Cat@ponder.cat · 5 months agoCISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.plus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.plus-squarewww.cisa.govCat@ponder.cat · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoUSB Army Knife – A Powerful Red Team Tool for Penetration Testersplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUSB Army Knife – A Powerful Red Team Tool for Penetration Testersplus-squarecybersecuritynews.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoOver 12,000 KerioControl firewalls exposed to exploited RCE flawplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 12,000 KerioControl firewalls exposed to exploited RCE flawplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoSeven Years Old Linux Kernel Vulnerability Let Attackers Execute Remote Codeplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSeven Years Old Linux Kernel Vulnerability Let Attackers Execute Remote Codeplus-squarecybersecuritynews.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
shellsharks@infosec.pubM · 5 months agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
shellsharks@infosec.pubM · 5 months agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoHackers spoof Microsoft ADFS login pages to steal credentialsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers spoof Microsoft ADFS login pages to steal credentialsplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
shellsharks@infosec.pubM · 5 months agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoResearcher sniffs out three-year Go supply chain attackplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearcher sniffs out three-year Go supply chain attackplus-squarewww.theregister.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
mwguy@infosec.exchange · 5 months agoMusk’s DOGE Minions Refuse to Reveal Their Names When Grilling Civil Servantsplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareMusk’s DOGE Minions Refuse to Reveal Their Names When Grilling Civil Servantsplus-squaremwguy@infosec.exchange · 5 months agomessage-square0fedilink
shellsharks@infosec.pubM · 5 months agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoGoogle takes action to counter G.co phishing abuseplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle takes action to counter G.co phishing abuseplus-squarewww.theregister.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoRANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementationsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementationsplus-squarethehackernews.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
cm0002@lemmy.world · 5 months agoNew Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detectionplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detectionplus-squarecybersecuritynews.comcm0002@lemmy.world · 5 months agomessage-square0fedilink
shellsharks@infosec.pubM · 5 months agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 5 months agomessage-square0fedilink