Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoRansomware Groups Favor Repeatable Access Over Mass Exploitsplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkRansomware Groups Favor Repeatable Access Over Mass Exploitsplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoData breach at Japanese telecom giant NTT hits 18,000 companiesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkData breach at Japanese telecom giant NTT hits 18,000 companiesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoEDR And Vendor Consolidation Are A Losing Approach To Cybersecurityplus-squareinformationsecuritybuzz.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkEDR And Vendor Consolidation Are A Losing Approach To Cybersecurityplus-squareinformationsecuritybuzz.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoRansomware gangs are now sending threatening typed letters to victimized businesses - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkRansomware gangs are now sending threatening typed letters to victimized businesses - Cybersecurity Insidersplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoRansomware gang encrypted network from a webcam to bypass EDRplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRansomware gang encrypted network from a webcam to bypass EDRplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoMedusa Ransomware Claims 40+ Victims in 2025plus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMedusa Ransomware Claims 40+ Victims in 2025plus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoMalicious Chrome extensions can spoof password managers in new attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkMalicious Chrome extensions can spoof password managers in new attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoSafe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heistplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkSafe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heistplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoU.S. Charges 12 Chinese Nationals in State-Backed Hacking Operationsplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up126arrow-down10
arrow-up126arrow-down1external-linkU.S. Charges 12 Chinese Nationals in State-Backed Hacking Operationsplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoUnmasking the new persistent attacks on Japanplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkUnmasking the new persistent attacks on Japanplus-squareblog.talosintelligence.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoMicrosoft says malvertising campaign impacted 1 million PCsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkMicrosoft says malvertising campaign impacted 1 million PCsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square1fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoRussian crypto exchange Garantex’s website taken down in apparent law enforcement operationplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkRussian crypto exchange Garantex’s website taken down in apparent law enforcement operationplus-squaretherecord.mediaKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoYouTube warns of AI-generated video of its CEO used in phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkYouTube warns of AI-generated video of its CEO used in phishing attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoEncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishingplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishingplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoOver 37,000 VMware ESXi servers vulnerable to ongoing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkOver 37,000 VMware ESXi servers vulnerable to ongoing attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agoVulnerability in Chaty Pro Plugin Exposes 18,000 WordPress Sitesplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVulnerability in Chaty Pro Plugin Exposes 18,000 WordPress Sitesplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoCVE-2025-25012 (CVSS 9.9): Critical Code Execution Vulnerability Patched in Elastic Kibanaplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up14arrow-down12
arrow-up12arrow-down1external-linkCVE-2025-25012 (CVSS 9.9): Critical Code Execution Vulnerability Patched in Elastic Kibanaplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoRed Report 2025 - Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systemsplus-squarewww.picussecurity.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkRed Report 2025 - Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systemsplus-squarewww.picussecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoHealthcare Sector Targeted by Fake CAPTCHA Attack on HEP2go to Deliver Infostealer Malware | Arctic Wolfplus-squarearcticwolf.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHealthcare Sector Targeted by Fake CAPTCHA Attack on HEP2go to Deliver Infostealer Malware | Arctic Wolfplus-squarearcticwolf.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agoQilin claims attacks on cancer, women's clinicsplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkQilin claims attacks on cancer, women's clinicsplus-squarewww.theregister.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 days agomessage-square0fedilink