Kid@sh.itjust.worksMEnglish · 2 months agoNorth Korean Lazarus Group Now Working With Medusa Ransomwareplus-squarewww.security.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korean Lazarus Group Now Working With Medusa Ransomwareplus-squarewww.security.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Valnao@sh.itjust.worksEnglish · 2 months agoConnected cars can be hacked, research findsplus-squarenews.northeastern.eduexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConnected cars can be hacked, research findsplus-squarenews.northeastern.eduValnao@sh.itjust.worksEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoLeading Semiconductor Supplier Advantest Hit by Ransomware Attack - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLeading Semiconductor Supplier Advantest Hit by Ransomware Attack - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoMultiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacksplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacksplus-squarehackread.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · edit-22 months agoMicrosoft Copilot Ignored Sensitivity Labels, Processed Confidential Emailsplus-squarewww.techrepublic.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft Copilot Ignored Sensitivity Labels, Processed Confidential Emailsplus-squarewww.techrepublic.comKid@sh.itjust.worksMEnglish · edit-22 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoOver 200K Australian Driver’s Licences Exposed in youX Cyber Breachplus-squarewww.techrepublic.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 200K Australian Driver’s Licences Exposed in youX Cyber Breachplus-squarewww.techrepublic.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoAd tech firm Optimizely confirms data breach after vishing attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAd tech firm Optimizely confirms data breach after vishing attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoSpain arrests suspected hacktivists for DDoSing govt sitesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSpain arrests suspected hacktivists for DDoSing govt sitesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoConduent Data Breach - Largest Data Breach in U.S. History As Ransomware Group Stolen 8 TB of Dataplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConduent Data Breach - Largest Data Breach in U.S. History As Ransomware Group Stolen 8 TB of Dataplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoGoogle Chrome Emergency Security Update Patches Three High-Severity Vulnerabilitiesplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Chrome Emergency Security Update Patches Three High-Severity Vulnerabilitiesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoShinyHunters Allegedly Claim Breach of 21 Million Records from Odidoplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkShinyHunters Allegedly Claim Breach of 21 Million Records from Odidoplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoWormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bombplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bombplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoAPT28 Targeted European Entities Using Webhook-Based Macro Malwareplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAPT28 Targeted European Entities Using Webhook-Based Macro Malwareplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoHackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attackplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attackplus-squarehackread.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoAn AI coding bot took down Amazon Web Services - Ars Technicaplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn AI coding bot took down Amazon Web Services - Ars Technicaplus-squarearstechnica.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoCISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalogplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalogplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoHow Android Malware Makes Itself Unkillable and “Un”-Uninstallable | by carson12345 | Feb, 2026 | InfoSec Write-upsplus-squareinfosecwriteups.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow Android Malware Makes Itself Unkillable and “Un”-Uninstallable | by carson12345 | Feb, 2026 | InfoSec Write-upsplus-squareinfosecwriteups.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoJapanese tech giant Advantest hit by ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJapanese tech giant Advantest hit by ransomware attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoAmazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAmazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 months agoMalicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokensplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokensplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 months agomessage-square0fedilink