Lanky_Pomegranate530@midwest.social to Android@lemmy.ml · 12 days agoAndroid apps are blocking sideloading and forcing Google Play versions insteadplus-squarearstechnica.comexternal-linkmessage-square5fedilinkarrow-up130arrow-down13
arrow-up127arrow-down1external-linkAndroid apps are blocking sideloading and forcing Google Play versions insteadplus-squarearstechnica.comLanky_Pomegranate530@midwest.social to Android@lemmy.ml · 12 days agomessage-square5fedilink
Lanky_Pomegranate530@midwest.social to Android@lemmy.ml · 12 days agoAndroid apps are blocking sideloading and forcing Google Play versions insteadplus-squarearstechnica.comexternal-linkmessage-square2fedilinkarrow-up132arrow-down13
arrow-up129arrow-down1external-linkAndroid apps are blocking sideloading and forcing Google Play versions insteadplus-squarearstechnica.comLanky_Pomegranate530@midwest.social to Android@lemmy.ml · 12 days agomessage-square2fedilink
Lanky_Pomegranate530@midwest.social to Linux@lemmy.ml · 1 month agoMicrosoft donates the Mono Project to the Wine teamplus-squarewww.gamingonlinux.comexternal-linkmessage-square34fedilinkarrow-up1199arrow-down13
arrow-up1196arrow-down1external-linkMicrosoft donates the Mono Project to the Wine teamplus-squarewww.gamingonlinux.comLanky_Pomegranate530@midwest.social to Linux@lemmy.ml · 1 month agomessage-square34fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoZscaler takes "test environment" offline after rumors of a breachplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkZscaler takes "test environment" offline after rumors of a breachplus-squarewww.bleepingcomputer.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoCISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerabilityplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkCISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerabilityplus-squarethehackernews.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoResearchers sinkhole PlugX malware server with 2.5 million unique IPsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkResearchers sinkhole PlugX malware server with 2.5 million unique IPsplus-squarewww.bleepingcomputer.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months ago73% of SME security pros missed or ignored critical alerts - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square3fedilinkarrow-up123arrow-down11
arrow-up122arrow-down1external-link73% of SME security pros missed or ignored critical alerts - Help Net Securityplus-squarewww.helpnetsecurity.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square3fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoUnitedHealth Pay Ransom After Change Healthcare Cyberattackplus-squarethecyberexpress.comexternal-linkmessage-square1fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linkUnitedHealth Pay Ransom After Change Healthcare Cyberattackplus-squarethecyberexpress.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square1fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoRussian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theftplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up120arrow-down10
arrow-up120arrow-down1external-linkRussian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theftplus-squarethehackernews.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agoBlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Toolplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkBlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Toolplus-squarethehackernews.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 5 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoFIN7 targets American automaker’s IT staff in phishing attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkFIN7 targets American automaker’s IT staff in phishing attacksplus-squarewww.bleepingcomputer.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoCookie-Monster - BOF To Steal Browser Cookies & Credentials - RedPacket Securityplus-squarewww.redpacketsecurity.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkCookie-Monster - BOF To Steal Browser Cookies & Credentials - RedPacket Securityplus-squarewww.redpacketsecurity.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoRussian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down12
arrow-up117arrow-down1external-linkRussian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacksplus-squarethehackernews.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoNavigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.plus-squarewww.cyberdefensemagazine.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNavigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.plus-squarewww.cyberdefensemagazine.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoWeathering the phishing front.plus-squarethecyberwire.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkWeathering the phishing front.plus-squarethecyberwire.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoThe US Government Has a Microsoft Problemplus-squarewww.wired.comexternal-linkmessage-square3fedilinkarrow-up175arrow-down15
arrow-up170arrow-down1external-linkThe US Government Has a Microsoft Problemplus-squarewww.wired.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square3fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoAdapting to the Deluge of Cybersecurity Data - Cyber Defense Magazineplus-squarewww.cyberdefensemagazine.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkAdapting to the Deluge of Cybersecurity Data - Cyber Defense Magazineplus-squarewww.cyberdefensemagazine.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoHow to protect IP surveillance cameras from Wi-Fi jamming - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square4fedilinkarrow-up111arrow-down13
arrow-up18arrow-down1external-linkHow to protect IP surveillance cameras from Wi-Fi jamming - Help Net Securityplus-squarewww.helpnetsecurity.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square4fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoFatalRAT Phishing Campaign Targets Cryptocurrency Usersplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkFatalRAT Phishing Campaign Targets Cryptocurrency Usersplus-squarethecyberexpress.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agoSafeguarding America's Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure - Cyber Defense Magazineplus-squarewww.cyberdefensemagazine.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down12
arrow-up110arrow-down1external-linkSafeguarding America's Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure - Cyber Defense Magazineplus-squarewww.cyberdefensemagazine.comLanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 6 months agomessage-square0fedilink
minus-squareLanky_Pomegranate530@midwest.socialOPMtoCybersecurity@sh.itjust.works•Microsoft: 87% of UK Businesses Are Unprepared for Cyberattacks - Source: www.techrepublic.comlinkfedilinkEnglisharrow-up2·6 months agoYeah they did. linkfedilink
Yeah they did.