🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agoTrust Hijacked: The Subtle Art of Phishing Through Familiar Facadesplus-squarewww.group-ib.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkTrust Hijacked: The Subtle Art of Phishing Through Familiar Facadesplus-squarewww.group-ib.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agoLookout Discovers New Chinese Surveillance Tool Used by Public Securityplus-squarewww.lookout.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkLookout Discovers New Chinese Surveillance Tool Used by Public Securityplus-squarewww.lookout.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agoLikely China-based Attackers Target High-profile Organizations in Southeast Asiaplus-squarewww.security.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down12
arrow-up11arrow-down1external-linkLikely China-based Attackers Target High-profile Organizations in Southeast Asiaplus-squarewww.security.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-212 days agoAnalysis of Nova: A Snake Keylogger Forkplus-squareany.runexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnalysis of Nova: A Snake Keylogger Forkplus-squareany.run🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-212 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agoLaw enforcement shuts down 27 DDoS booters ahead of annual Christmas attacksplus-squarewww.europol.europa.euexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkLaw enforcement shuts down 27 DDoS booters ahead of annual Christmas attacksplus-squarewww.europol.europa.eu🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-212 days agoSilent Push Unwraps the AIZ—Aggressive Inventory Zombies—Retail & Crypto Phishing Network Campaignplus-squarewww.silentpush.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkSilent Push Unwraps the AIZ—Aggressive Inventory Zombies—Retail & Crypto Phishing Network Campaignplus-squarewww.silentpush.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-212 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agoOperation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelsplus-squarewww.sentinelone.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkOperation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelsplus-squarewww.sentinelone.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agoFrom PoC to Attacker Interest in Hours: Real-Time Insights into Mitel MiCollab Vulnerabilitiesplus-squarewww.greynoise.ioexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkFrom PoC to Attacker Interest in Hours: Real-Time Insights into Mitel MiCollab Vulnerabilitiesplus-squarewww.greynoise.io🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 12 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-212 days agoHoliday Season Cyber Threats (Part 2): Ransomware, Gift Cards, and Point-of-Sale breachesplus-squareintel471.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkHoliday Season Cyber Threats (Part 2): Ransomware, Gift Cards, and Point-of-Sale breachesplus-squareintel471.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-212 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agoChina-Based Hacker Charged for Conspiring to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwideplus-squarewww.justice.govexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkChina-Based Hacker Charged for Conspiring to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwideplus-squarewww.justice.gov🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agoChina’s Propaganda Expansion: Inside the Rise of International Communication Centers (ICCs)plus-squarewww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChina’s Propaganda Expansion: Inside the Rise of International Communication Centers (ICCs)plus-squarewww.recordedfuture.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agoThreat Actors Exploit Flaw in Cleo File Transfer Tools ‘En Masse’plus-squarewww.vulnu.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThreat Actors Exploit Flaw in Cleo File Transfer Tools ‘En Masse’plus-squarewww.vulnu.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agoAppLite: A New AntiDot Variant Targeting Mobile Employee Devicesplus-squarewww.zimperium.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkAppLite: A New AntiDot Variant Targeting Mobile Employee Devicesplus-squarewww.zimperium.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agoHead Mare Intensifies Attacks On Russia With PhantomCoreplus-squarecyble.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHead Mare Intensifies Attacks On Russia With PhantomCoreplus-squarecyble.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agoManufacturing Companies Targeted with New Lumma Campaignplus-squareany.runexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkManufacturing Companies Targeted with New Lumma Campaignplus-squareany.run🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agoFrom Vulnerabilities to Breaches: The Shiny Nemesis Cyber Operationplus-squarewww.vpnmentor.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkFrom Vulnerabilities to Breaches: The Shiny Nemesis Cyber Operationplus-squarewww.vpnmentor.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 13 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 14 days agoBlack Basta Ransomware Campaign Drops Zbot, DarkGate, & Custom Malwareplus-squarewww.rapid7.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBlack Basta Ransomware Campaign Drops Zbot, DarkGate, & Custom Malwareplus-squarewww.rapid7.com🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 14 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 14 days agoCompromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injectionplus-squareflatt.techexternal-linkmessage-square0fedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkCompromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injectionplus-squareflatt.tech🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 14 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-214 days agoA cyber-physical digital twin approach to replicating realistic multi-stage cyberattacks on smart gridsplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkA cyber-physical digital twin approach to replicating realistic multi-stage cyberattacks on smart gridsplus-squarearxiv.org🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · edit-214 days agomessage-square0fedilink
🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 14 days agoEvaluating an Effective Ransomware Infection Vector in Low Earth Orbit Satellitesplus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkEvaluating an Effective Ransomware Infection Vector in Low Earth Orbit Satellitesplus-squarearxiv.org🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 14 days agomessage-square0fedilink
minus-square🃏Joker@sh.itjust.worksOPtoOpen Source@lemmy.ml•Is NewPipeX a legit project?linkfedilinkEnglisharrow-up2arrow-down1·30 days agoDoes not use projects like piped. linkfedilink
minus-square🃏Joker@sh.itjust.worksOPtoOpen Source@lemmy.ml•Is NewPipeX a legit project?linkfedilinkEnglisharrow-up5arrow-down14·1 month agoThe codebase is in Java. linkfedilink
minus-square🃏Joker@sh.itjust.worksOPtoOpen Source@lemmy.ml•Is NewPipeX a legit project?linkfedilinkEnglisharrow-up5arrow-down6·1 month agoPipePipe is not written in kotlin. linkfedilink
minus-square🃏Joker@sh.itjust.worksOPtocybersecurity@infosec.pub•KC Man Indicted for Computer Hackinglinkfedilinkarrow-up3·1 month agoThis story keeps going on and on, this is one of the most interesting DOJ press releases I had ever read. linkfedilink
Does not use projects like piped.