- 3.19K Posts
- 52 Comments
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems WorldwideEnglish
4·8 months agoThe first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•CISA warns of potential data breaches caused by legacy Oracle Cloud leakEnglish
1·9 months agoDirect link.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•DeepSeek found to be sharing user data with TikTok parent company ByteDanceEnglish
5·11 months ago!selfhosted@lemmy.world to the win!
Kid@sh.itjust.worksMto
Cybersecurity@sh.itjust.works•How to scan PDF files for malware?English
3·11 months agoI didn’t know about that tool. Apparently, it is a CDR, which I like very much. I’m not aware of any good open-source implementations.
Kid@sh.itjust.worksMto
Cybersecurity@sh.itjust.works•[Patched 09/02/25] Leaking the email of any YouTube user for $10,000English
6·11 months agoVery nice approach!
Some points about the article:
Nature of the Vulnerability: The vulnerability is a security flaw that allows leaking the email associated with a YouTube channel by exploiting endpoints from both YouTube and Google Pixel Recorder.
Impact: It allows an attacker to obtain the email associated with any YouTube channel, which can lead to phishing attacks, privacy invasion, and other malicious activities. This potentially affects all YouTube users who own a channel.
Fix Status: The vulnerability has been fixed by Google. Both parts of the exploit were resolved by 02/09/2025, and the report was disclosed on 02/12/2025.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Proton Mail still down as Proton recovers from worldwide outageEnglish
39·1 year agoApparently was not related to a cyber attack, as stated in status page (https://status.proton.me/)
We have resolved all service outages, and the situation has been stable for some time. We have identified the root cause of the problem, implemented a fix, and are now monitoring the results. Jan 09, 2025 - 19:27 CET
Kid@sh.itjust.worksMto
Cybersecurity@sh.itjust.works•Good Projects for People Getting Started in CybersecEnglish
3·1 year agoWelcome! I dont know you background, but I would suggest get into selfhosting. There are several projects related to cybersecurity, fun and useful. Ex: MISP, Pihole, The Hive.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Remote attack on pagers used by Hezbollah caused 9 deaths and thousands of injuriesEnglish
8·1 year agoUpdate: Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (https://www.nytimes.com/2024/09/17/world/middleeast/israel-hezbollah-pagers-explosives.html)
Kid@sh.itjust.worksMto
Cybersecurity@sh.itjust.works•If you had to access an unfamiliar flash drive (or other data storage), what safety precautions would you take?English
7·1 year agoYou can use https://tails.net/ booting from another flash drive in memory only.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Donald Trump interview with Elon Musk disrupted by DDoS Cyber AttackEnglish
1·1 year agoAgreed
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•The Illusion Of Reputational DamageEnglish
5·1 year agoI like to use the 2013 Target breach case. They lost $1 billion due to the attack, their stocks dropped significantly after the attack, had several lawsuits, they closed a few stores, and changed the CEO and CIO. But a few months later, all was forgiven, their stocks recovered, and life went on.
Don’t get me wrong, the risks of a cyber attack have to be taken seriously. But I feel that I have overestimated the impacts of reputational damage my whole life, as an infosec professional. My thinking was always like this: if you get reputational damage, you are done, no chance to recover, it is the end of it.
I’m following the Crowdstrike case, but I would bet that they will lose some market share (mostly prospects), perhaps some layoffs, but stocks will come up eventually.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•332 Million Email Addresses Scraped from SOCRadar.io Dumped OnlineEnglish
2·1 year agoNot as much as if it contained passwords, for sure. Bu it gives a nice mailing list for phishing and so on.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Major Russian banks hit with DDoS attacks as Ukraine claims responsibilityEnglish
9·1 year agoDepends of the country. Disrupt with Internet/communications may be a crime in some countries.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Cyber firm KnowBe4 hired a fake IT worker from North KoreaEnglish
12·1 year agoKudos to SOC team.
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•CrowdStrike Explains Friday Incident Crashing Millions of Windows DevicesEnglish
5·1 year agoCrowdStrike report of the incident: https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/
Kid@sh.itjust.worksOPMto
Cybersecurity@sh.itjust.works•Police allege ‘evil twin’ in-flight Wi-Fi used to steal infoEnglish
2·2 years agoWell, depends. If the user go to a captive portal to “authenticate” before the VPN could closes, than no. But, if the VPN can “pierce” through it (without any intervention from the AP), than yes. Anyways, If the user is willing to provide authentication data (like social media accounts, etc), nothing matters.










The incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was: