Kid@sh.itjust.worksMEnglish · 23 hours agoLouis Vuitton, Dior, and Tiffany fined $25 million over data breachesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkLouis Vuitton, Dior, and Tiffany fined $25 million over data breachesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 23 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 23 hours agoCISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkCISA Warns of Microsoft Configuration Manager SQL Injection Vulnerability Exploited in Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 23 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 24 hours agoThreat actor Allegedly Selling Critical Severity OpenSea 0-day Exploit Chain on Hacking Forumsplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkThreat actor Allegedly Selling Critical Severity OpenSea 0-day Exploit Chain on Hacking Forumsplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 24 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 23 hours agoClaude LLM artifacts abused to push Mac infostealers in ClickFix attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkClaude LLM artifacts abused to push Mac infostealers in ClickFix attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 23 hours agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days ago287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Usersplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-link287 Chrome Extensions Exfiltrate Browsing History From 37.4 Million Usersplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoMicrosoft: New Windows LNK spoofing issues aren't vulnerabilitiesplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkMicrosoft: New Windows LNK spoofing issues aren't vulnerabilitiesplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoAMOS infostealer targets macOS through a popular AI appplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkAMOS infostealer targets macOS through a popular AI appplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square1linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoLazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystemsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkLazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystemsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoRomania's oil pipeline operator Conpet confirms data stolen in attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRomania's oil pipeline operator Conpet confirms data stolen in attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 2 days agoResearchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerabilityplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkResearchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerabilityplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 2 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoMicrosoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Daysplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkMicrosoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Daysplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoGitLab Patches Multiple Vulnerabilities That Enables DoS and Cross-site Scripting Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkGitLab Patches Multiple Vulnerabilities That Enables DoS and Cross-site Scripting Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoSSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploitsplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkSSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploitsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoDPRK IT Workers Impersonating Individuals Using Real LinkedIn Accounts to Apply for Remote Rolesplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkDPRK IT Workers Impersonating Individuals Using Real LinkedIn Accounts to Apply for Remote Rolesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoGuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defensesplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkGuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defensesplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 6 days agoClaude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacksplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up122arrow-down10
arrow-up122arrow-down1external-linkClaude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacksplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 6 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 4 days agoCoinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategyplus-squarecybersecuritynews.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCoinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategyplus-squarecybersecuritynews.comKid@sh.itjust.worksMEnglish · 4 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoFortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Executionplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkFortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Executionplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoChinese cyberspies breach Singapore's four largest telcosplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkChinese cyberspies breach Singapore's four largest telcosplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink
Kid@sh.itjust.worksMEnglish · 5 days agoDutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Dataplus-squarethehackernews.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkDutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Dataplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 5 days agomessage-square0linkfedilink