Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agoGPU-Powered Evasion: Unpacking the Sophisticated CoffeeLoader Malwareplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGPU-Powered Evasion: Unpacking the Sophisticated CoffeeLoader Malwareplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agoFake Zoom, Real Ransom: Nine-Day Malware Intrusion Ends with BlackSuit Ransomware Blastplus-squaresecurityonline.infoexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFake Zoom, Real Ransom: Nine-Day Malware Intrusion Ends with BlackSuit Ransomware Blastplus-squaresecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agoAnalysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques - CYFIRMAplus-squarewww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques - CYFIRMAplus-squarewww.cyfirma.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agoWas Check Point hacked? Security firm calls ransom demands old newsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWas Check Point hacked? Security firm calls ransom demands old newsplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agoOracle Still Denies Breach as Researchers Persistplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOracle Still Denies Breach as Researchers Persistplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agoPhaaS actor uses DoH and DNS MX to dynamically distribute phishingplus-squareblogs.infoblox.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhaaS actor uses DoH and DNS MX to dynamically distribute phishingplus-squareblogs.infoblox.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 19 hours agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoHackers Abuse COM Objects for Fileless Malware Lateral Movementsplus-squarecybersecuritynews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHackers Abuse COM Objects for Fileless Malware Lateral Movementsplus-squarecybersecuritynews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days ago'Lucid' Phishing-as-a-Service Exploits Faults in iMessage, Android RCSplus-squarewww.darkreading.comexternal-linkmessage-square2fedilinkarrow-up19arrow-down12
arrow-up17arrow-down1external-link'Lucid' Phishing-as-a-Service Exploits Faults in iMessage, Android RCSplus-squarewww.darkreading.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square2fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoNew Windows zero-day leaks NTLM hashes, gets unofficial patchplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkNew Windows zero-day leaks NTLM hashes, gets unofficial patchplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoInside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloadsplus-squarelabs.k7computing.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloadsplus-squarelabs.k7computing.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoBrowser-in-the-Browser attacks target CS2 players' Steam accountsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkBrowser-in-the-Browser attacks target CS2 players' Steam accountsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoRedCurl cyberspies create ransomware to encrypt Hyper-V serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkRedCurl cyberspies create ransomware to encrypt Hyper-V serversplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoChina-linked FamousSparrow APT group resurfaces with enhanced capabilities - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkChina-linked FamousSparrow APT group resurfaces with enhanced capabilities - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoOracle customers confirm data stolen in alleged cloud breach is validplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkOracle customers confirm data stolen in alleged cloud breach is validplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoUK fines software provider £3.07 million for 2022 ransomware breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkUK fines software provider £3.07 million for 2022 ransomware breachplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoNew Atlantis AIO platform automates credential stuffing on 140 servicesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNew Atlantis AIO platform automates credential stuffing on 140 servicesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoMalicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkMalicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacksplus-squarethehackernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoFacePass security lapse exposes users' identification dataplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkFacePass security lapse exposes users' identification dataplus-squarecybernews.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agoNew Ransomware Group Claims Attack on US Telecom Firm WideOpenWestplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew Ransomware Group Claims Attack on US Telecom Firm WideOpenWestplus-squarewww.securityweek.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agoNew Phishing Campaign Targets macOS Users with Fake Security Alertsplus-squarehackread.comexternal-linkmessage-square3fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkNew Phishing Campaign Targets macOS Users with Fake Security Alertsplus-squarehackread.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 days agomessage-square3fedilink
minus-squareKid@sh.itjust.worksOPMtoCybersecurity@sh.itjust.works•Pay, fight, or stall? The dilemma of ransomware negotiations - Help Net SecuritylinkfedilinkEnglisharrow-up2·15 days agoLeak extortion is the main issue nowadays, not covered by backups, I’m afraid. linkfedilink
Leak extortion is the main issue nowadays, not covered by backups, I’m afraid.