☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 days agoRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRussian-backed hackers have gained access to Signal and WhatsApp accounts used by officials, military personnel and journalists, as claimed by two intelligence agencies in the Netherlands.plus-squarewww.reuters.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 2 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 days agoGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.comexternal-linkmessage-square1linkfedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkGoogle Safe Browsing missed 84% of phishing sites we found in Februaryplus-squarewww.norn-labs.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 5 days agomessage-square1linkfedilink
Zerush@lemmy.ml · 6 days agoGlobal phishing-as-a-service platform taken down in coordinated public-private actionplus-squarewww.europol.europa.euexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGlobal phishing-as-a-service platform taken down in coordinated public-private actionplus-squarewww.europol.europa.euZerush@lemmy.ml · 6 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 5 days agoFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politicsplus-squareedition.cnn.comZerush@lemmy.ml · 5 days agomessage-square0linkfedilink
davel@lemmy.mlEnglish · edit-28 days agoNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comexternal-linkmessage-square7linkfedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkNew AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprisesplus-squarearstechnica.comdavel@lemmy.mlEnglish · edit-28 days agomessage-square7linkfedilink
Zerush@lemmy.ml · 9 days agohackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkhackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actionsplus-squarewww.stepsecurity.ioZerush@lemmy.ml · 9 days agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 9 days agoVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkVulnerability Report - February 2026plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 9 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 13 days agoFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.comexternal-linkmessage-square0linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkFake Job Interviews Are Installing Backdoors on Developer Machinesplus-squarethreatroad.substack.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 13 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 16 days agoAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkAI-augmented threat actor accesses FortiGate devices at scaleplus-squareaws.amazon.comZerush@lemmy.ml · 16 days agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 16 days agoWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.comexternal-linkmessage-square1linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkWe hid backdoors in ~40MB binaries and asked AI + Ghidra to find themplus-squarequesma.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 16 days agomessage-square1linkfedilink
Cedric@lemmy.mlEnglish · 21 days agoVulnerability Report - January 2026plus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareVulnerability Report - January 2026plus-squareCedric@lemmy.mlEnglish · 21 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 22 days agoPassword managers less secure than promisedplus-squareethz.chexternal-linkmessage-square3linkfedilinkarrow-up122arrow-down12
arrow-up120arrow-down1external-linkPassword managers less secure than promisedplus-squareethz.chZerush@lemmy.ml · 22 days agomessage-square3linkfedilink
Cedric@lemmy.mlEnglish · 23 days agoVulnerability-Lookup 4.0.0 is out – Federation is hereplus-squaremessage-squaremessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1message-squareVulnerability-Lookup 4.0.0 is out – Federation is hereplus-squareCedric@lemmy.mlEnglish · 23 days agomessage-square0linkfedilink
Zerush@lemmy.ml · 25 days agoFake AI Chrome extensions with 300K users steal credentials, emailsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square3linkfedilinkarrow-up129arrow-down10
arrow-up129arrow-down1external-linkFake AI Chrome extensions with 300K users steal credentials, emailsplus-squarewww.bleepingcomputer.comZerush@lemmy.ml · 25 days agomessage-square3linkfedilink
Zerush@lemmy.ml · 29 days agoFake 7-Zip downloads are turning home PCs into proxy nodesplus-squarewww.malwarebytes.comexternal-linkmessage-square6linkfedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkFake 7-Zip downloads are turning home PCs into proxy nodesplus-squarewww.malwarebytes.comZerush@lemmy.ml · 29 days agomessage-square6linkfedilink
Zerush@lemmy.ml · 1 month agoThe Shadow Campaigns: Uncovering Global Espionageplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkThe Shadow Campaigns: Uncovering Global Espionageplus-squareunit42.paloaltonetworks.comZerush@lemmy.ml · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 1 month agoVulnerability-Lookup 3.0.0plus-squarewww.vulnerability-lookup.orgexternal-linkmessage-square2linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkVulnerability-Lookup 3.0.0plus-squarewww.vulnerability-lookup.orgCedric@lemmy.mlEnglish · 1 month agomessage-square2linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoMinimal CVE Hardened container image collectionplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMinimal CVE Hardened container image collectionplus-squaregithub.com☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agoPhishing attack: Numerous journalists targeted in attack via Signal Messengerplus-squarenetzpolitik.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkPhishing attack: Numerous journalists targeted in attack via Signal Messengerplus-squarenetzpolitik.org☆ Yσɠƚԋσʂ ☆@lemmy.mlEnglish · 1 month agomessage-square0linkfedilink
Cedric@lemmy.mlEnglish · 2 months agoVulnerability-Lookup 2.21.0plus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareVulnerability-Lookup 2.21.0plus-squareCedric@lemmy.mlEnglish · 2 months agomessage-square0linkfedilink