TuxBot@infosec.pubMBEnglish · 52 minutes agoMicrosoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI studyplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMicrosoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI studyplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 52 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 34 minutes agoSpam With A Political Twist: Fraudsters Are Exploiting The Election Seasonplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSpam With A Political Twist: Fraudsters Are Exploiting The Election Seasonplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 34 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoUNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networksplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networksplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoAvoid Scams After Disaster Strikesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAvoid Scams After Disaster Strikesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 4 hours agoLazarus Group Deploys Linux FASTCash Malware to Steal Millions in Coordinated ATM Attacks | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkLazarus Group Deploys Linux FASTCash Malware to Steal Millions in Coordinated ATM Attacks | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comsv1sjp@lemmy.worldMEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoJetpack fixes critical information disclosure flaw existing since 2016plus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJetpack fixes critical information disclosure flaw existing since 2016plus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoHuntStand - 2,795,947 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkHuntStand - 2,795,947 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 10 hours agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 10 hours agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoCVE-2024-6197 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1strplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-6197 Hackerone: CVE-2024-6197 Freeing stack buffer in utf8asn1strplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoSilent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutionsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSilent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutionsplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 6 hours agoSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaresocial.skynetcloud.siteexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSplunk Enterprise Vulnerabilities let Attackers Execute Remote Codeplus-squaresocial.skynetcloud.sitesv1sjp@lemmy.worldMEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoWhy Do Criminals Love Phishing-as-a-Service Platforms?plus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhy Do Criminals Love Phishing-as-a-Service Platforms?plus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 6 hours agoLow-Level Development on Retail Android Hardware - Reconnaissance and Prototyping a Bootloaderplus-squareblog.timschumi.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLow-Level Development on Retail Android Hardware - Reconnaissance and Prototyping a Bootloaderplus-squareblog.timschumi.netsv1sjp@lemmy.worldMEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square0fedilink