- 2.76K Posts
- 77 Comments
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Critical Key Derivation Flaws in pbkdf2 Affect Millions of JavaScript Projects, PoC AvailableEnglish
3·5 months agoSorry. It was not paywalled for me when I first saw. More info from different source: https://feedly.com/cve/CVE-2025-6545
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Google Cloud incident reportEnglish
4·5 months agoThe incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was:
- A new feature added to Service Control on May 29, 2025, without adequate error handling.
- The policy change with blank fields was globally replicated and caused Service Control binaries to crash.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•84% of Organizations’ SOC Analysts are Unknowingly Investigating the Same IncidentsEnglish
2·5 months agoThanks! Corrected
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems WorldwideEnglish
9·6 months agoThe first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•You think ransomware is bad? Wait until it infects CPUsEnglish
6·6 months agoNoted!
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•CISA warns of potential data breaches caused by legacy Oracle Cloud leakEnglish
6·7 months agoDirect link.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Pay, fight, or stall? The dilemma of ransomware negotiations - Help Net SecurityEnglish
2·8 months agoLeak extortion is the main issue nowadays, not covered by backups, I’m afraid.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•DeepSeek found to be sharing user data with TikTok parent company ByteDanceEnglish
6·9 months ago!selfhosted@lemmy.world to the win!
Kid@sh.itjust.worksMto
Cybersecurity@sh.itjust.works•How to scan PDF files for malware?English
4·9 months agoI didn’t know about that tool. Apparently, it is a CDR, which I like very much. I’m not aware of any good open-source implementations.
Kid@sh.itjust.worksMto
Cybersecurity@sh.itjust.works•[Patched 09/02/25] Leaking the email of any YouTube user for $10,000English
9·9 months agoVery nice approach!
Some points about the article:
Nature of the Vulnerability: The vulnerability is a security flaw that allows leaking the email associated with a YouTube channel by exploiting endpoints from both YouTube and Google Pixel Recorder.
Impact: It allows an attacker to obtain the email associated with any YouTube channel, which can lead to phishing attacks, privacy invasion, and other malicious activities. This potentially affects all YouTube users who own a channel.
Fix Status: The vulnerability has been fixed by Google. Both parts of the exploit were resolved by 02/09/2025, and the report was disclosed on 02/12/2025.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Proton Mail still down as Proton recovers from worldwide outageEnglish
50·10 months agoApparently was not related to a cyber attack, as stated in status page (https://status.proton.me/)
We have resolved all service outages, and the situation has been stable for some time. We have identified the root cause of the problem, implemented a fix, and are now monitoring the results. Jan 09, 2025 - 19:27 CET
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Researcher Details CVE-2024-44131 - A Critical TCC Bypass in macOS and iOSEnglish
1·11 months agoOriginal research: https://www.jamf.com/blog/tcc-bypass-steals-data-from-icloud/
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Deloitte UK Hacked - Brain Cipher Group Claim to Have Stolen 1 TB of DataEnglish
1·11 months agoFor now, the threat actor is just claiming that they hacked BT. No prove whatsoever. Groups usually post a sample of the data when they claim a victim, but that is not the case, for now.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Deloitte UK Hacked - Brain Cipher Group Claim to Have Stolen 1 TB of DataEnglish
4·1 year agoIf you are asking if the main attack vector was phishing, they are not clear on that:
According to statements released by Brain Cipher, they have exploited critical weaknesses within Deloitte UK’s cybersecurity infrastructure.
Kid@sh.itjust.worksMto
Cybersecurity@sh.itjust.works•Good Projects for People Getting Started in CybersecEnglish
3·1 year agoWelcome! I dont know you background, but I would suggest get into selfhosting. There are several projects related to cybersecurity, fun and useful. Ex: MISP, Pihole, The Hive.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT VariantEnglish
12·1 year agoThat’s why I don’t use Kaspersky :)
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT VariantEnglish
12·1 year agoIn my opinion, you will always be at the mercy of a government in this context: US, China, Russia. In the end it’s a matter of choosing which one. FOSS maybe a little less, but in the end it’s almost the same. That’s my view, of course. That doesn’t mean you can’t give them a hard time ;)










https://feedly.com/cve/CVE-2025-6547