TuxBot@infosec.pubMBEnglish · 10 minutes agoThe Ultimate DSPM Guide: Webinar on Building a Strong Data Security Postureplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Ultimate DSPM Guide: Webinar on Building a Strong Data Security Postureplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 10 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 44 minutes agoSwitch - 5,397 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSwitch - 5,397 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 44 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoCVE-2024-43566 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCVE-2024-43566 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoWater Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malwareplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWater Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malwareplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoFBI arrest Alabama man suspected of hacking SEC's X accountplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkFBI arrest Alabama man suspected of hacking SEC's X accountplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoShedding Light on Election Deepfakesplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkShedding Light on Election Deepfakesplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoCISA Releases Seven Industrial Control Systems Advisoriesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Releases Seven Industrial Control Systems Advisoriesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoInsurance giant Globe Life facing extortion attempts after data theft from subsidiaryplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkInsurance giant Globe Life facing extortion attempts after data theft from subsidiaryplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
mwguy@infosec.pubEnglish · 2 days agoFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.comexternal-linkmessage-square4fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.commwguy@infosec.pubEnglish · 2 days agomessage-square4fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoLynx Ransomware: A Rebranding of INC Ransomwareplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLynx Ransomware: A Rebranding of INC Ransomwareplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoMicrosoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browserplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browserplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoCritical Vulnerability in Kubernetes Image Builder Exposes Nodes to Root Accessplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCritical Vulnerability in Kubernetes Image Builder Exposes Nodes to Root Accessplus-squarethecyberexpress.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoWhispers from the Dark Web Cave. Cyberthreats in the Middle Eastplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhispers from the Dark Web Cave. Cyberthreats in the Middle Eastplus-squaresecurelist.comTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 9 hours agoEscalating cyber threats demand stronger global defense and cooperationplus-squareblogs.microsoft.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkEscalating cyber threats demand stronger global defense and cooperationplus-squareblogs.microsoft.comTuxBot@infosec.pubMBEnglish · 9 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoMuah.AI - 1,910,261 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkMuah.AI - 1,910,261 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoPatch Tuesday, October 2024 Editionplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPatch Tuesday, October 2024 Editionplus-squarekrebsonsecurity.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 12 hours agoMore than 5,000 arrested, thousands of websites disrupted in crackdown on illegal gambling during Euro tournamentplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMore than 5,000 arrested, thousands of websites disrupted in crackdown on illegal gambling during Euro tournamentplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 12 hours agomessage-square0fedilink