Kid@sh.itjust.worksMEnglish · 9 hours agoLegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Codeplus-squarehackread.comexternal-linkmessage-square5fedilinkarrow-up124
arrow-up124external-linkLegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Codeplus-squarehackread.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoPerplexity is using stealth, undeclared crawlers to evade website no-crawl directivesplus-squareblog.cloudflare.comexternal-linkmessage-square5fedilinkarrow-up149
arrow-up149external-linkPerplexity is using stealth, undeclared crawlers to evade website no-crawl directivesplus-squareblog.cloudflare.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square5fedilink
Kid@sh.itjust.worksMEnglish · edit-29 hours agoCritical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escapeplus-squaresocket.devexternal-linkmessage-square0fedilinkarrow-up16
arrow-up16external-linkCritical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escapeplus-squaresocket.devKid@sh.itjust.worksMEnglish · edit-29 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoRansomware groups shift to quadruple extortion to maximize pressure - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkRansomware groups shift to quadruple extortion to maximize pressure - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 9 hours agoNvidia Patches Critical RCE Vulnerability Chainplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkNvidia Patches Critical RCE Vulnerability Chainplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 9 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoSearch Engines are Indexing ChatGPT Conversations! - Here is our OSINT Researchplus-squarecybersecuritynews.comexternal-linkmessage-square3fedilinkarrow-up131
arrow-up131external-linkSearch Engines are Indexing ChatGPT Conversations! - Here is our OSINT Researchplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoFrom Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy - DomainTools Investigations | DTIplus-squaredti.domaintools.comexternal-linkmessage-square1fedilinkarrow-up19
arrow-up19external-linkFrom Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy - DomainTools Investigations | DTIplus-squaredti.domaintools.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoRansomware gangs join attacks targeting Microsoft SharePoint serversplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up117
arrow-up117external-linkRansomware gangs join attacks targeting Microsoft SharePoint serversplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoPi-hole discloses data breach triggered by WordPress plugin flawplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up126
arrow-up126external-linkPi-hole discloses data breach triggered by WordPress plugin flawplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoNew ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theftplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up110
arrow-up110external-linkNew ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theftplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoAI-powered Cursor IDE vulnerable to prompt-injection attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up116
arrow-up116external-linkAI-powered Cursor IDE vulnerable to prompt-injection attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoThreat actor uses AI to create a better crypto wallet drainerplus-squaregetsafety.comexternal-linkmessage-square0fedilinkarrow-up115
arrow-up115external-linkThreat actor uses AI to create a better crypto wallet drainerplus-squaregetsafety.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoAttackers exploit link-wrapping services to steal Microsoft 365 loginsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up112
arrow-up112external-linkAttackers exploit link-wrapping services to steal Microsoft 365 loginsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoAverage global data breach cost now $4.44 million - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up112
arrow-up112external-linkAverage global data breach cost now $4.44 million - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoEarly Warning Signals: When Attacker Behavior Precedes New Vulnerabilitiesplus-squarewww.greynoise.ioexternal-linkmessage-square0fedilinkarrow-up110
arrow-up110external-linkEarly Warning Signals: When Attacker Behavior Precedes New Vulnerabilitiesplus-squarewww.greynoise.ioKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoSonicWall firewall devices hit in surge of Akira ransomware attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18
arrow-up18external-linkSonicWall firewall devices hit in surge of Akira ransomware attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoAPT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoorplus-squarehunt.ioexternal-linkmessage-square0fedilinkarrow-up14
arrow-up14external-linkAPT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoorplus-squarehunt.ioKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink
Amoxtli@thelemmy.clubEnglish · 3 days agoChina accuses US of exploiting Microsoft zero-day in cyberattackplus-squarecyberscoop.comexternal-linkmessage-square3fedilinkarrow-up119
arrow-up119external-linkChina accuses US of exploiting Microsoft zero-day in cyberattackplus-squarecyberscoop.comAmoxtli@thelemmy.clubEnglish · 3 days agomessage-square3fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoCritical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploitsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up114
arrow-up114external-linkCritical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploitsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 5 days agoInc Ransomware Claims 1.2TB Data Breach at Dollar Treeplus-squarehackread.comexternal-linkmessage-square0fedilinkarrow-up16
arrow-up16external-linkInc Ransomware Claims 1.2TB Data Breach at Dollar Treeplus-squarehackread.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0fedilink