videodrome@lemmy.capebreton.socialM · 4 months agoRecord mega breach in France impacts up to 43 million peopleplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRecord mega breach in France impacts up to 43 million peopleplus-squarewww.theregister.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoMicrosoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMicrosoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence - Cado Security | Cloud Forensics & Incident Responseplus-squarewww.cadosecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence - Cado Security | Cloud Forensics & Incident Responseplus-squarewww.cadosecurity.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoPHRACK # 71 CALL FOR PAPERSwww.phrack.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPHRACK # 71 CALL FOR PAPERSwww.phrack.orgvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoCyberattack Paralyzes the Largest U.S. Health Care Payment Systemplus-squarewww.nytimes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCyberattack Paralyzes the Largest U.S. Health Care Payment Systemplus-squarewww.nytimes.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoVMware urges emergency action to blunt hypervisor flawsplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVMware urges emergency action to blunt hypervisor flawsplus-squarewww.theregister.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoHackers exploited Windows 0-day for 6 months after Microsoft knew of itplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers exploited Windows 0-day for 6 months after Microsoft knew of itplus-squarearstechnica.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearchers create AI worms that can spread from one system to anotherplus-squarearstechnica.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
vikingqueef@lemmy.world · 4 months agoLiteSpeed Cache Plugin Exposes 5 Million WordPress Sites to Privilege Escalation | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLiteSpeed Cache Plugin Exposes 5 Million WordPress Sites to Privilege Escalation | Black Hat Ethical Hackingplus-squarewww.blackhatethicalhacking.comvikingqueef@lemmy.world · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoThe US has overtaken Russia as the most-breached countryplus-squarewww.techspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe US has overtaken Russia as the most-breached countryplus-squarewww.techspot.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10cross-posted to: cybersecurity@lemmy.capebreton.social
arrow-up11arrow-down1external-linkNIST Releases Version 2.0 of Landmark Cybersecurity Frameworkplus-squarewww.nist.govvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilinkcross-posted to: cybersecurity@lemmy.capebreton.social
videodrome@lemmy.capebreton.socialM · 4 months agoFeds hack LockBit, LockBit springs back. Now what? | TechCrunchplus-squaretechcrunch.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFeds hack LockBit, LockBit springs back. Now what? | TechCrunchplus-squaretechcrunch.comvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 4 months agoUpdated: Top Cyber Actions for Securing Water Systems | CISAplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUpdated: Top Cyber Actions for Securing Water Systems | CISAplus-squarewww.cisa.govvideodrome@lemmy.capebreton.socialM · 4 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 5 months agoCanadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Securityplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCanadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Securityplus-squarekrebsonsecurity.comvideodrome@lemmy.capebreton.socialM · 5 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 5 months agoCredentials are Still King: Leaked Credentials, Data Breaches and Dark Web Marketsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCredentials are Still King: Leaked Credentials, Data Breaches and Dark Web Marketsplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 5 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 5 months agoPixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack.plus-squareblog.quarkslab.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack.plus-squareblog.quarkslab.comvideodrome@lemmy.capebreton.socialM · 5 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 5 months agoThe Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Storyarchive.isexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Storyarchive.isvideodrome@lemmy.capebreton.socialM · 5 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 5 months agoOver 178K SonicWall firewalls vulnerable to DoS, potential RCE attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOver 178K SonicWall firewalls vulnerable to DoS, potential RCE attacksplus-squarewww.bleepingcomputer.comvideodrome@lemmy.capebreton.socialM · 5 months agomessage-square0fedilink
videodrome@lemmy.capebreton.socialM · 6 months agoIvanti zero-day victim count grows as Mandiant weighs inplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti zero-day victim count grows as Mandiant weighs inplus-squarewww.theregister.comvideodrome@lemmy.capebreton.socialM · 6 months agomessage-square0fedilink