cm0002@lemmy.world · 3 days agoChatGPT creates phisher’s paradise by serving wrong URLsplus-squarewww.theregister.comexternal-linkmessage-square1linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkChatGPT creates phisher’s paradise by serving wrong URLsplus-squarewww.theregister.comcm0002@lemmy.world · 3 days agomessage-square1linkfedilink
Hotznplotzn@lemmy.sdf.org · 2 days agoNew Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Findsplus-squarewww.silentpush.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down12
arrow-up16arrow-down1external-linkNew Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Findsplus-squarewww.silentpush.comHotznplotzn@lemmy.sdf.org · 2 days agomessage-square0linkfedilink
Pro@programming.dev · 3 days agoHow I Scanned all of GitHub’s “Oops Commits” for Leaked Secretsplus-squaretrufflesecurity.comexternal-linkmessage-square0linkfedilinkarrow-up121arrow-down12
arrow-up119arrow-down1external-linkHow I Scanned all of GitHub’s “Oops Commits” for Leaked Secretsplus-squaretrufflesecurity.comPro@programming.dev · 3 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 3 days agoFrance: Chinese Hackers Exploited Ivanti Flaw Targeting Government Agencies, Telecoms, Firms In Media, Finance, Transport Sectorsplus-squarewww.bankinfosecurity.comexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkFrance: Chinese Hackers Exploited Ivanti Flaw Targeting Government Agencies, Telecoms, Firms In Media, Finance, Transport Sectorsplus-squarewww.bankinfosecurity.comHotznplotzn@lemmy.sdf.org · 3 days agomessage-square0linkfedilink
cm0002@lemmy.world · 5 days agoUS disrupts North Korean IT worker "laptop farm" scheme in 16 statesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkUS disrupts North Korean IT worker "laptop farm" scheme in 16 statesplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 5 days agomessage-square1linkfedilink
Pro@programming.dev · 3 days agoPro-Russian hacktivism: Shifting alliances, new groups and risksintel471.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPro-Russian hacktivism: Shifting alliances, new groups and risksintel471.comPro@programming.dev · 3 days agomessage-square0linkfedilink
cm0002@lemmy.world · 5 days agoBreak The Air Gap With Ultrasoundplus-squarehackaday.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBreak The Air Gap With Ultrasoundplus-squarehackaday.comcm0002@lemmy.world · 5 days agomessage-square0linkfedilink
Pro@reddthat.com · 5 days agoJasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizationsplus-squarewww.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkJasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizationsplus-squarewww.microsoft.comPro@reddthat.com · 5 days agomessage-square0linkfedilink
cm0002@lemmy.world · 5 days agoNew FileFix attack runs JScript while bypassing Windows MoTW alertsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNew FileFix attack runs JScript while bypassing Windows MoTW alertsplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 5 days agomessage-square0linkfedilink
cm0002@lemmy.world · 5 days agoPro-Iran hacktivists borrow from Russia's cyber playbookplus-squarewww.axios.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPro-Iran hacktivists borrow from Russia's cyber playbookplus-squarewww.axios.comcm0002@lemmy.world · 5 days agomessage-square0linkfedilink
cm0002@lemmy.world · 6 days agoHikvision Canada ordered to cease operations over security risksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHikvision Canada ordered to cease operations over security risksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 6 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 6 days agoQilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UKplus-squarehackread.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkQilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UKplus-squarehackread.comHotznplotzn@lemmy.sdf.org · 6 days agomessage-square0linkfedilink
SayCyberOnceMore@feddit.uk · 6 days agoStumbled on to StormShield - opinions?plus-squarewww.stormshield.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkStumbled on to StormShield - opinions?plus-squarewww.stormshield.comSayCyberOnceMore@feddit.uk · 6 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 8 days agoCanada orders China's Hikvision to close Canadian operations over national security concernsplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCanada orders China's Hikvision to close Canadian operations over national security concernsplus-squarewww.reuters.comHotznplotzn@lemmy.sdf.org · 8 days agomessage-square0linkfedilink
cm0002@lemmy.world · 8 days agoCitrix Bleed 2 flaw now believed to be exploited in attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkCitrix Bleed 2 flaw now believed to be exploited in attacksplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 8 days agomessage-square0linkfedilink
Pro@programming.dev · 9 days agomommy Access Brokerintel471.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkmommy Access Brokerintel471.comPro@programming.dev · 9 days agomessage-square0linkfedilink
Pro@programming.dev · 9 days agoCriminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudplus-squarewww.ic3.govexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCriminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudplus-squarewww.ic3.govPro@programming.dev · 9 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.org · 9 days agoAuthoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studyplus-squarewww.swp-berlin.orgexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAuthoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studyplus-squarewww.swp-berlin.orgHotznplotzn@lemmy.sdf.org · 9 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 9 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 9 days agomessage-square0linkfedilink
shellsharks@infosec.pubM · 11 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square4linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 11 days agomessage-square4linkfedilink