linkbot@lemmy.linkMBEnglish · 11 months agoNew Android Malware CherryBlos Utilizing OCR to Steal Sensitive Dataplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew Android Malware CherryBlos Utilizing OCR to Steal Sensitive Dataplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoApple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuseplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkApple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuseplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoRFP Template for Browser Securityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkRFP Template for Browser Securityplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoHackers Deploy "SUBMARINE" Backdoor in Barracuda Email Security Gateway Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHackers Deploy "SUBMARINE" Backdoor in Barracuda Email Security Gateway Attacksplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoIvanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active Attackplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active Attackplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoIcedID Malware Adapts and Expands Threat with Updated BackConnect Moduleplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIcedID Malware Adapts and Expands Threat with Updated BackConnect Moduleplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoSTARK#MULE Targets Koreans with U.S. Military-themed Document Luresplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSTARK#MULE Targets Koreans with U.S. Military-themed Document Luresplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoHackers Abusing Windows Search Feature to Install Remote Access Trojansplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Abusing Windows Search Feature to Install Remote Access Trojansplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoA Data Exfiltration Attack Scenario: The Porsche Experienceplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Data Exfiltration Attack Scenario: The Porsche Experienceplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoBlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entitiesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entitiesplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoCybersecurity Agencies Warn Against IDOR Bugs Exploited for Data Breachesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybersecurity Agencies Warn Against IDOR Bugs Exploited for Data Breachesplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoMajor Security Flaw Discovered in Metabase BI Software – Urgent Update Requiredplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMajor Security Flaw Discovered in Metabase BI Software – Urgent Update Requiredplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoNew Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Adsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Adsplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoGameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Usersplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Usersplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoThe 4 Keys to Building Cloud Security Programs That Can Actually Shift Leftplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe 4 Keys to Building Cloud Security Programs That Can Actually Shift Leftplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoGroup-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High Treasonplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGroup-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High Treasonplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoHackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Miningplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Miningplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoNew SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Daysplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Daysplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoRussia Sends Cybersecurity CEO to Jail for 14 Yearsplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkRussia Sends Cybersecurity CEO to Jail for 14 Yearsplus-squarekrebsonsecurity.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 11 months agoDecoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDecoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networksplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 11 months agomessage-square0fedilink