higgsboson@piefed.socialEnglish · 2 minutes agoOpen source registries don't have enough money to implement basic securityplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOpen source registries don't have enough money to implement basic securityplus-squarewww.theregister.comhiggsboson@piefed.socialEnglish · 2 minutes agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 9 hours agoAll US Social Security numbers may need to be changed following a massive breach that is already being investigated as a national threatplus-squarewww.ecoticias.comexternal-linkmessage-square11linkfedilinkarrow-up169arrow-down15
arrow-up164arrow-down1external-linkAll US Social Security numbers may need to be changed following a massive breach that is already being investigated as a national threatplus-squarewww.ecoticias.comInnerworld@lemmy.worldEnglish · 9 hours agomessage-square11linkfedilink
Kid@sh.itjust.worksMEnglish · 12 hours agoNew Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Releasedplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up131arrow-down10
arrow-up131arrow-down1external-linkNew Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Releasedplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 12 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoLotus Blossom Hackers Compromised Official Hosting Infrastructure of Notepad++cybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up120arrow-down12
arrow-up118arrow-down1external-linkLotus Blossom Hackers Compromised Official Hosting Infrastructure of Notepad++cybersecuritynews.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 12 hours agoNew ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theftplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkNew ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theftplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 12 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 13 hours agoCanada Goose investigating as hackers leak 600K customer recordsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkCanada Goose investigating as hackers leak 600K customer recordsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 13 hours agomessage-square0linkfedilink
xoron@programming.devEnglish · edit-211 hours agoSimpleX Clone - No Setup or Signupplus-squaremessage-squaremessage-square0linkfedilinkarrow-up18arrow-down13
arrow-up15arrow-down1message-squareSimpleX Clone - No Setup or Signupplus-squarexoron@programming.devEnglish · edit-211 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoOne threat actor responsible for 83% of recent Ivanti RCE attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkOne threat actor responsible for 83% of recent Ivanti RCE attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoNew Clickfix Exploit Tricks Users into Changing DNS Settings for Malware Installationcybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkNew Clickfix Exploit Tricks Users into Changing DNS Settings for Malware Installationcybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoLouis Vuitton, Dior, and Tiffany fined $25 million over data breachesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up136arrow-down10
arrow-up136arrow-down1external-linkLouis Vuitton, Dior, and Tiffany fined $25 million over data breachesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoCISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attackscybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up121arrow-down10
arrow-up121arrow-down1external-linkCISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attackscybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days ago287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Userscybersecuritynews.comexternal-linkmessage-square2linkfedilinkarrow-up149arrow-down11
arrow-up148arrow-down1external-link287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Userscybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoThreat actor Allegedly Selling Critical Severity OpenSea 0-day Exploit Chain on Hacking Forumscybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThreat actor Allegedly Selling Critical Severity OpenSea 0-day Exploit Chain on Hacking Forumscybersecuritynews.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 3 days agoClaude LLM artifacts abused to push Mac infostealers in ClickFix attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkClaude LLM artifacts abused to push Mac infostealers in ClickFix attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 3 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoMicrosoft: New Windows LNK spoofing issues aren't vulnerabilitiesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square2linkfedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkMicrosoft: New Windows LNK spoofing issues aren't vulnerabilitiesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoAMOS infostealer targets macOS through a popular AI appplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkAMOS infostealer targets macOS through a popular AI appplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoLazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystemsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkLazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystemsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Hotznplotzn@lemmy.sdf.orgEnglish · 6 days agoLeaked technical documents show China rehearsing cyberattacks on neighbors’ critical infrastructureplus-squaretherecord.mediaexternal-linkmessage-square2linkfedilinkarrow-up143arrow-down13
arrow-up140arrow-down1external-linkLeaked technical documents show China rehearsing cyberattacks on neighbors’ critical infrastructureplus-squaretherecord.mediaHotznplotzn@lemmy.sdf.orgEnglish · 6 days agomessage-square2linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoRomania's oil pipeline operator Conpet confirms data stolen in attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkRomania's oil pipeline operator Conpet confirms data stolen in attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoResearchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerabilityplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkResearchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerabilityplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink