BrikoX@lemmy.zipEnglish · 7 hours agoDaMAgeCard SD Express card vulnerability leverages the privileged access that PCIe provides — bypasses traditional software-based security mechanismsplus-squarewww.tomshardware.comexternal-linkmessage-square4fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkDaMAgeCard SD Express card vulnerability leverages the privileged access that PCIe provides — bypasses traditional software-based security mechanismsplus-squarewww.tomshardware.comBrikoX@lemmy.zipEnglish · 7 hours agomessage-square4fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoRomanian energy supplier Electrica hit by ransomware attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkRomanian energy supplier Electrica hit by ransomware attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoNew DroidBot Android Spyware Targeting Banking and Crypto Usersplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkNew DroidBot Android Spyware Targeting Banking and Crypto Usersplus-squarehackread.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoTexas Teen Arrested for Scattered Spider Telecom Hacksplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkTexas Teen Arrested for Scattered Spider Telecom Hacksplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoSocks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devicesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkSocks5Systemz Botnet Powers Illegal Proxy Service with 85,000+ Hacked Devicesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoNew Transaction-Relay Jamming Vulnerability Let Attackers Exploits Bitcoin Nodesplus-squaregbhackers.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkNew Transaction-Relay Jamming Vulnerability Let Attackers Exploits Bitcoin Nodesplus-squaregbhackers.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoRussian Hacktivists Target Energy And Water Infrastructureplus-squarecyble.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkRussian Hacktivists Target Energy And Water Infrastructureplus-squarecyble.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoRedLine info-stealer campaign targets Russian businessesplus-squaresecurityaffairs.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRedLine info-stealer campaign targets Russian businessesplus-squaresecurityaffairs.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
BrikoX@lemmy.zipEnglish · 21 hours agoZero-day Windows NTLM hash vulnerability gets patched by third-party —credentials can be hijacked by merely viewing a malicious file in File Explorerplus-squarewww.tomshardware.comexternal-linkmessage-square0fedilinkarrow-up181arrow-down11
arrow-up180arrow-down1external-linkZero-day Windows NTLM hash vulnerability gets patched by third-party —credentials can be hijacked by merely viewing a malicious file in File Explorerplus-squarewww.tomshardware.comBrikoX@lemmy.zipEnglish · 21 hours agomessage-square0fedilink
chappedafloat@lemmy.wtfEnglish · 22 hours agoFirmware security is super advanced, lets help each other understand Bootguardplus-squaremessage-squaremessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1message-squareFirmware security is super advanced, lets help each other understand Bootguardplus-squarechappedafloat@lemmy.wtfEnglish · 22 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoChina bans use of Intel, AMD and Nvidia Processor Chips for security concernsplus-squarewww.cybersecurity-insiders.comexternal-linkmessage-square52fedilinkarrow-up1204arrow-down110
arrow-up1194arrow-down1external-linkChina bans use of Intel, AMD and Nvidia Processor Chips for security concernsplus-squarewww.cybersecurity-insiders.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square52fedilink
BrikoX@lemmy.zipEnglish · edit-22 days agoRomania's election systems targeted in over 85,000 cyberattacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up139arrow-down10
arrow-up139arrow-down1external-linkRomania's election systems targeted in over 85,000 cyberattacksplus-squarewww.bleepingcomputer.comBrikoX@lemmy.zipEnglish · edit-22 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoFBI Warns Americans to Start Using Encrypted Messaging Appsplus-squaregizmodo.comexternal-linkmessage-square53fedilinkarrow-up1189arrow-down14
arrow-up1185arrow-down1external-linkFBI Warns Americans to Start Using Encrypted Messaging Appsplus-squaregizmodo.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square53fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoMicrosoft spots another China spy crew stealing US dataplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up143arrow-down10
arrow-up143arrow-down1external-linkMicrosoft spots another China spy crew stealing US dataplus-squarewww.theregister.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoResearchers Uncover Flaws in Popular Open-Source Machine Learning Frameworksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkResearchers Uncover Flaws in Popular Open-Source Machine Learning Frameworksplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 days agoUkraine’s DDoS attack cripples Russia’s Gazprombankplus-squareenglish.nv.uaexternal-linkmessage-square2fedilinkarrow-up149arrow-down10
arrow-up149arrow-down1external-linkUkraine’s DDoS attack cripples Russia’s Gazprombankplus-squareenglish.nv.uaKid@sh.itjust.worksMEnglish · 4 days agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoChinese Hackers Breach US Firm, Maintain Network Access for Monthsplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up137arrow-down12
arrow-up135arrow-down1external-linkChinese Hackers Breach US Firm, Maintain Network Access for Monthsplus-squarehackread.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoRussian programmer says FSB agents planted spyware on his Android phoneplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkRussian programmer says FSB agents planted spyware on his Android phoneplus-squaretechcrunch.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoRussia's 'BlueAlpha' APT Hides in Cloudflare Tunnelsplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkRussia's 'BlueAlpha' APT Hides in Cloudflare Tunnelsplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 days agoNew QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Securityplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkNew QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Securityplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0fedilink