Kid@sh.itjust.worksMEnglish · 20 hours agoMicrosoft sues service for creating illicit content with its AI platformplus-squarearstechnica.comexternal-linkmessage-square4fedilinkarrow-up135arrow-down11
arrow-up134arrow-down1external-linkMicrosoft sues service for creating illicit content with its AI platformplus-squarearstechnica.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square4fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoEU law enforcement training agency data breach: Data of 97,000 individuals compromisedplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkEU law enforcement training agency data breach: Data of 97,000 individuals compromisedplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 15 hours agoRansomware crew abuses AWS native encryptionplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkRansomware crew abuses AWS native encryptionplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 15 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoUK domain registry Nominet confirms breach via Ivanti zero-dayplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkUK domain registry Nominet confirms breach via Ivanti zero-dayplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoChinese hackers breached US government office that assesses foreign investments for national security risksedition.cnn.comexternal-linkmessage-square0fedilinkarrow-up143arrow-down10
arrow-up143arrow-down1external-linkChinese hackers breached US government office that assesses foreign investments for national security risksedition.cnn.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoPoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)plus-squaregbhackers.comexternal-linkmessage-square1fedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkPoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)plus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 19 hours agoPhishing Campaigns Exploit YouTube URLs and Microsoft 365 Themes to Steal Credentialsplus-squaresecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up114arrow-down12
arrow-up112arrow-down1external-linkPhishing Campaigns Exploit YouTube URLs and Microsoft 365 Themes to Steal Credentialsplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 19 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoNoName057 targets Italy again after Zelensky's visit to the countryplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkNoName057 targets Italy again after Zelensky's visit to the countryplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoNew Web3 attack exploits transaction simulations to steal cryptoplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkNew Web3 attack exploits transaction simulations to steal cryptoplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoIBM Watsonx.ai Vulnerability Let Attackers Trigger XSS Attacksplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkIBM Watsonx.ai Vulnerability Let Attackers Trigger XSS Attacksplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 hours agoMeet FunkSec: A New, Surprising Ransomware Group, Powered by AIplus-squareblog.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMeet FunkSec: A New, Surprising Ransomware Group, Powered by AIplus-squareblog.checkpoint.comKid@sh.itjust.worksMEnglish · 20 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoFCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Complianceplus-squarethehackernews.comexternal-linkmessage-square10fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkFCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Complianceplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square10fedilink
Kid@sh.itjust.worksMEnglish · edit-24 days agoProton Mail still down as Proton recovers from worldwide outageplus-squarewww.bleepingcomputer.comexternal-linkmessage-square8fedilinkarrow-up1139arrow-down12
arrow-up1137arrow-down1external-linkProton Mail still down as Proton recovers from worldwide outageplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · edit-24 days agomessage-square8fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoJuniper Networks Vulnerability Let Remote Attacker Execute Network Attacksplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkJuniper Networks Vulnerability Let Remote Attacker Execute Network Attacksplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoTelefónica confirms internal ticketing system breach after data leakplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkTelefónica confirms internal ticketing system breach after data leakplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1fedilink
PhilipTheBucket@ponder.catEnglish · 3 days agoChinese cyber-spies target CFIUS investigationsplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkChinese cyber-spies target CFIUS investigationsplus-squarego.theregister.comPhilipTheBucket@ponder.catEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoNew Gmail Cyber Attack Warning As Private Key Hackers Strikeplus-squarewww.forbes.comexternal-linkmessage-square2fedilinkarrow-up113arrow-down14
arrow-up19arrow-down1external-linkNew Gmail Cyber Attack Warning As Private Key Hackers Strikeplus-squarewww.forbes.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoFake LDAPNightmare PoC Exploit Conceals Information-Stealing Malwareplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkFake LDAPNightmare PoC Exploit Conceals Information-Stealing Malwareplus-squaresecurityonline.infoKid@sh.itjust.worksMEnglish · 4 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoJapanese police claim China ran five-year cyberattackplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up149arrow-down10
arrow-up149arrow-down1external-linkJapanese police claim China ran five-year cyberattackplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 6 days agoOver 4,000 backdoors hijacked by registering expired domainsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up159arrow-down10
arrow-up159arrow-down1external-linkOver 4,000 backdoors hijacked by registering expired domainsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square1fedilink