🃏Joker@sh.itjust.works · 10 hours agoNew era of slop security reports for open sourceplus-squaresethmlarson.devexternal-linkmessage-square0fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkNew era of slop security reports for open sourceplus-squaresethmlarson.dev🃏Joker@sh.itjust.works · 10 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day agoThe fascinating security model of dark web marketplacesplus-squareboehs.orgexternal-linkmessage-square11fedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkThe fascinating security model of dark web marketplacesplus-squareboehs.org🃏Joker@sh.itjust.works · 1 day agomessage-square11fedilink
🃏Joker@sh.itjust.works · 13 hours agoHello, this is your chatbot leaking: WotNot exposes 346K sensitive customer filesplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkHello, this is your chatbot leaking: WotNot exposes 346K sensitive customer filesplus-squarecybernews.com🃏Joker@sh.itjust.works · 13 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 14 hours agoRepeat offenders drive bulk of tech support scams via Google Adsplus-squarewww.malwarebytes.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkRepeat offenders drive bulk of tech support scams via Google Adsplus-squarewww.malwarebytes.com🃏Joker@sh.itjust.works · 14 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 19 hours agoAd fraud on large online platformsplus-squarecert.plexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkAd fraud on large online platformsplus-squarecert.pl🃏Joker@sh.itjust.works · 19 hours agomessage-square1fedilink
🃏Joker@sh.itjust.works · 15 hours agoDetailing the Attack Surfaces of the WolfBox E40 EV Chargerplus-squarewww.thezdi.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkDetailing the Attack Surfaces of the WolfBox E40 EV Chargerplus-squarewww.thezdi.com🃏Joker@sh.itjust.works · 15 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 16 hours agoHardware Security Failure Scenariosplus-squarewww.nist.govexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHardware Security Failure Scenariosplus-squarewww.nist.gov🃏Joker@sh.itjust.works · 16 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 14 hours agoHunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scamplus-squarewww.silentpush.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scamplus-squarewww.silentpush.com🃏Joker@sh.itjust.works · 14 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 17 hours agoCISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providersplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providersplus-squarewww.cisa.gov🃏Joker@sh.itjust.works · 17 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day ago"Oh, sh*t! I actually opened the document!": An Empirical Study of the Experiences with Suspicious Emails in Virtual Reality Headsetsplus-squarearxiv.orgexternal-linkmessage-square1fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link"Oh, sh*t! I actually opened the document!": An Empirical Study of the Experiences with Suspicious Emails in Virtual Reality Headsetsplus-squarearxiv.org🃏Joker@sh.itjust.works · 1 day agomessage-square1fedilink
🃏Joker@sh.itjust.works · 20 hours agoWindows Sockets: From Registered I/O to SYSTEM Privilegesplus-squareblog.exodusintel.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkWindows Sockets: From Registered I/O to SYSTEM Privilegesplus-squareblog.exodusintel.com🃏Joker@sh.itjust.works · 20 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 20 hours agoSmokeLoader Attack Targets Companies in Taiwanplus-squarewww.fortinet.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkSmokeLoader Attack Targets Companies in Taiwanplus-squarewww.fortinet.com🃏Joker@sh.itjust.works · 20 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day agoProtect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensionsplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkProtect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensionsplus-squarearxiv.org🃏Joker@sh.itjust.works · 1 day agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day agoThe Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigationplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkThe Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigationplus-squarearxiv.org🃏Joker@sh.itjust.works · 1 day agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day agoExposing LLM Vulnerabilities: Adversarial Scam Detection and Performanceplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkExposing LLM Vulnerabilities: Adversarial Scam Detection and Performanceplus-squarearxiv.org🃏Joker@sh.itjust.works · 1 day agomessage-square0fedilink
🃏Joker@sh.itjust.works · 20 hours agoInside Akira Ransomware's Rust Experimentplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkInside Akira Ransomware's Rust Experimentplus-squareresearch.checkpoint.com🃏Joker@sh.itjust.works · 20 hours agomessage-square0fedilink
shellsharks@infosec.pubM · 2 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 2 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 2 days agoUbuntu security advisory (AV24-685) - Canadian Centre for Cyber Securityplus-squarewww.cyber.gc.caexternal-linkmessage-square2fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkUbuntu security advisory (AV24-685) - Canadian Centre for Cyber Securityplus-squarewww.cyber.gc.ca🃏Joker@sh.itjust.works · 2 days agomessage-square2fedilink
🃏Joker@sh.itjust.works · edit-23 days agoSpyLoan: A Global Threat Exploiting Social Engineeringplus-squarewww.mcafee.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkSpyLoan: A Global Threat Exploiting Social Engineeringplus-squarewww.mcafee.com🃏Joker@sh.itjust.works · edit-23 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 4 days agoFrom a Regular Infostealer to its Obfuscated Versionplus-squareisc.sans.eduexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkFrom a Regular Infostealer to its Obfuscated Versionplus-squareisc.sans.edu🃏Joker@sh.itjust.works · 4 days agomessage-square0fedilink