TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 3 minutes agoThis Week in Security: Quantum RSA Break, Out of Scope, and Spoofing Packetsplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThis Week in Security: Quantum RSA Break, Out of Scope, and Spoofing Packetsplus-squarehackaday.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 3 minutes agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 3 minutes agoThe Ultimate DSPM Guide: Webinar on Building a Strong Data Security Postureplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Ultimate DSPM Guide: Webinar on Building a Strong Data Security Postureplus-squarethehackernews.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 3 minutes agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 37 minutes agoSwitch - 5,397 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSwitch - 5,397 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 37 minutes agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agoCVE-2024-43566 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCVE-2024-43566 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoWater Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malwareplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWater Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malwareplus-squarewww.trendmicro.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoShedding Light on Election Deepfakesplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkShedding Light on Election Deepfakesplus-squarewww.trustwave.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agoStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 3 hours agoStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 3 hours agoMOTU Audio Interface Resurrected After Some Reverse Engineeringplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkMOTU Audio Interface Resurrected After Some Reverse Engineeringplus-squarehackaday.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 3 hours agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 4 hours agoCISA Releases Seven Industrial Control Systems Advisoriesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Releases Seven Industrial Control Systems Advisoriesplus-squarewww.cisa.govTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 4 hours agoGet started with Raspberry Pi Pico-series and VS Codeplus-squarewww.raspberrypi.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGet started with Raspberry Pi Pico-series and VS Codeplus-squarewww.raspberrypi.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 4 hours agoFBI arrest Alabama man suspected of hacking SEC's X accountplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkFBI arrest Alabama man suspected of hacking SEC's X accountplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 4 hours agoLynx Ransomware: A Rebranding of INC Ransomwareplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLynx Ransomware: A Rebranding of INC Ransomwareplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 5 hours agoInsurance giant Globe Life facing extortion attempts after data theft from subsidiaryplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkInsurance giant Globe Life facing extortion attempts after data theft from subsidiaryplus-squaretherecord.mediaTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 5 hours agoWhispers from the Dark Web Cave. Cyberthreats in the Middle Eastplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhispers from the Dark Web Cave. Cyberthreats in the Middle Eastplus-squaresecurelist.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 6 hours agoPatch Tuesday, October 2024 Editionplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPatch Tuesday, October 2024 Editionplus-squarekrebsonsecurity.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 6 hours agoOvercomplicating the Magnetic Compass for a Reasonplus-squarehackaday.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOvercomplicating the Magnetic Compass for a Reasonplus-squarehackaday.comTuxBot@infosec.pubMB to Raspberry Pi News@infosec.pubEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 6 hours agoCritical Vulnerability in Kubernetes Image Builder Exposes Nodes to Root Accessplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCritical Vulnerability in Kubernetes Image Builder Exposes Nodes to Root Accessplus-squarethecyberexpress.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 7 hours agoMicrosoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browserplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browserplus-squarethehackernews.comTuxBot@infosec.pubMB to Infosec News@infosec.pubEnglish · 7 hours agomessage-square0fedilink
minus-squareTuxBot@infosec.pubOPMBtoInfosec News@infosec.pub•CISA Adds Three Known Exploited Vulnerabilities to CataloglinkfedilinkEnglisharrow-up1·3 days agothank you! :D linkfedilink
thank you! :D