TuxBot@infosec.pubMBEnglish · 2 minutes agoEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 2 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 minutes agoBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 8 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 19 minutes agoGoogle: 70% of exploited flaws disclosed in 2023 were zero-daysplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle: 70% of exploited flaws disclosed in 2023 were zero-daysplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 19 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 23 minutes agoSudanese brothers charged for ‘Anonymous Sudan’ attacks targeting critical infrastructure, government agencies and hospitalsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSudanese brothers charged for ‘Anonymous Sudan’ attacks targeting critical infrastructure, government agencies and hospitalsplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 23 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 53 minutes agoIranian hackers act as brokers selling critical infrastructure accessplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkIranian hackers act as brokers selling critical infrastructure accessplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 53 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoPronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loaderplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loaderplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 27 minutes agoUnit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risksplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkUnit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risksplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 27 minutes agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 3 hours agoNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkNorth Korea Hackers Get Cash Fast in Linux Cyber Heistsplus-squarewww.darkreading.comsv1sjp@lemmy.worldMEnglish · 3 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 16 hours agoChinese security officials call for investigation of Intel CPUs for chip failures and security flaws, says chipmaker 'threatens national security'plus-squarewww.tomshardware.comexternal-linkmessage-square1fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkChinese security officials call for investigation of Intel CPUs for chip failures and security flaws, says chipmaker 'threatens national security'plus-squarewww.tomshardware.comsv1sjp@lemmy.worldMEnglish · 16 hours agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 17 hours agoBlooms Today - 3,184,010 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkBlooms Today - 3,184,010 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 17 hours agomessage-square0fedilink
mwguy@infosec.pubEnglish · 17 hours agoFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.commwguy@infosec.pubEnglish · 17 hours agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 16 hours agoHackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activityplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 16 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 17 hours agoCVE-2024-38204 Imagine Cup site Information Disclosure Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-38204 Imagine Cup site Information Disclosure Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 17 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 day agoMore than two dozen countries have used internet outages to sway elections: reportplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMore than two dozen countries have used internet outages to sway elections: reportplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 1 day agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 18 hours agoFake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Dataplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Dataplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 18 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 day agoDistributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Mediaplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkDistributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Mediaplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 1 day agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 day agoTimeshare Owner? The Mexican Drug Cartels Want Youplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTimeshare Owner? The Mexican Drug Cartels Want Youplus-squarekrebsonsecurity.comTuxBot@infosec.pubMBEnglish · 1 day agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 day agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 1 day agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 day agoCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10cross-posted to: infosec_news@infosec.pub
arrow-up16arrow-down1external-linkCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 1 day agomessage-square0fedilinkcross-posted to: infosec_news@infosec.pub