linkbot@lemmy.linkMBEnglish · 1 year agoNew Android Malware CherryBlos Utilizing OCR to Steal Sensitive Dataplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew Android Malware CherryBlos Utilizing OCR to Steal Sensitive Dataplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoApple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuseplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkApple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuseplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoRFP Template for Browser Securityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkRFP Template for Browser Securityplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoHackers Deploy "SUBMARINE" Backdoor in Barracuda Email Security Gateway Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHackers Deploy "SUBMARINE" Backdoor in Barracuda Email Security Gateway Attacksplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoIvanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active Attackplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIvanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active Attackplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoIcedID Malware Adapts and Expands Threat with Updated BackConnect Moduleplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIcedID Malware Adapts and Expands Threat with Updated BackConnect Moduleplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoSTARK#MULE Targets Koreans with U.S. Military-themed Document Luresplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSTARK#MULE Targets Koreans with U.S. Military-themed Document Luresplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoHackers Abusing Windows Search Feature to Install Remote Access Trojansplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Abusing Windows Search Feature to Install Remote Access Trojansplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoA Data Exfiltration Attack Scenario: The Porsche Experienceplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Data Exfiltration Attack Scenario: The Porsche Experienceplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoBlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entitiesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entitiesplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoCybersecurity Agencies Warn Against IDOR Bugs Exploited for Data Breachesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybersecurity Agencies Warn Against IDOR Bugs Exploited for Data Breachesplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoMajor Security Flaw Discovered in Metabase BI Software – Urgent Update Requiredplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMajor Security Flaw Discovered in Metabase BI Software – Urgent Update Requiredplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoNew Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Adsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Adsplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoGameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Usersplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Usersplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoThe 4 Keys to Building Cloud Security Programs That Can Actually Shift Leftplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe 4 Keys to Building Cloud Security Programs That Can Actually Shift Leftplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoGroup-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High Treasonplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGroup-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High Treasonplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoHackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Miningplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Miningplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoNew SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Daysplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNew SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Daysplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoRussia Sends Cybersecurity CEO to Jail for 14 Yearsplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkRussia Sends Cybersecurity CEO to Jail for 14 Yearsplus-squarekrebsonsecurity.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink
linkbot@lemmy.linkMBEnglish · 1 year agoDecoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDecoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networksplus-squarethehackernews.comlinkbot@lemmy.linkMBEnglish · 1 year agomessage-square0fedilink