🃏Joker@sh.itjust.works · 1 hour agoUnauthorized access to iCloud: analyzing an iOS vulnerability that could expose sensitive data to attackersplus-squarewww.jamf.comexternal-linkmessage-square0fedilinkarrow-up16
arrow-up16external-linkUnauthorized access to iCloud: analyzing an iOS vulnerability that could expose sensitive data to attackersplus-squarewww.jamf.com🃏Joker@sh.itjust.works · 1 hour agomessage-square0fedilink
🃏Joker@sh.itjust.works · 2 hours agoJapanese publisher Kadokawa paid $3 million to Russia-linked hacker group after cyberattackplus-squaremainichi.jpexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkJapanese publisher Kadokawa paid $3 million to Russia-linked hacker group after cyberattackplus-squaremainichi.jp🃏Joker@sh.itjust.works · 2 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 3 hours agoHacktivist Alliances Target France Amidst Political Crisisplus-squarecyble.comexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkHacktivist Alliances Target France Amidst Political Crisisplus-squarecyble.com🃏Joker@sh.itjust.works · 3 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 3 hours agoAttack Exploiting Legitimate Service by APT-C-60plus-squareblogs.jpcert.or.jpexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkAttack Exploiting Legitimate Service by APT-C-60plus-squareblogs.jpcert.or.jp🃏Joker@sh.itjust.works · 3 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 4 hours agoCareto APT’s recent attacks discoveredplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up14
arrow-up14external-linkCareto APT’s recent attacks discoveredplus-squaresecurelist.com🃏Joker@sh.itjust.works · 4 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · edit-26 hours agoBadRAM: Breaching Processor Security via Rogue Memory Modulesplus-squarebadram.euexternal-linkmessage-square0fedilinkarrow-up111
arrow-up111external-linkBadRAM: Breaching Processor Security via Rogue Memory Modulesplus-squarebadram.eu🃏Joker@sh.itjust.works · edit-26 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 5 hours agoMicrosoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterpriseplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up14
arrow-up14external-linkMicrosoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterpriseplus-squarewww.microsoft.com🃏Joker@sh.itjust.works · 5 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 6 hours agoMessenger Group Call DoS for iOSplus-squares11research.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkMessenger Group Call DoS for iOSplus-squares11research.com🃏Joker@sh.itjust.works · 6 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 21 hours agoOasis Security Research Team Discovers Microsoft Azure MFA Bypassplus-squarewww.oasis.securityexternal-linkmessage-square0fedilinkarrow-up111
arrow-up111external-linkOasis Security Research Team Discovers Microsoft Azure MFA Bypassplus-squarewww.oasis.security🃏Joker@sh.itjust.works · 21 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 23 hours agoLookout Discovers New Chinese Surveillance Tool Used by Public Securityplus-squarewww.lookout.comexternal-linkmessage-square0fedilinkarrow-up110
arrow-up110external-linkLookout Discovers New Chinese Surveillance Tool Used by Public Securityplus-squarewww.lookout.com🃏Joker@sh.itjust.works · 23 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 21 hours agoFrequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraineplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up16
arrow-up16external-linkFrequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraineplus-squarewww.microsoft.com🃏Joker@sh.itjust.works · 21 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 21 hours agoCybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE - Smishing Triad in Actionplus-squarewww.resecurity.comexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkCybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE - Smishing Triad in Actionplus-squarewww.resecurity.com🃏Joker@sh.itjust.works · 21 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 22 hours agoTrust Hijacked: The Subtle Art of Phishing Through Familiar Facadesplus-squarewww.group-ib.comexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkTrust Hijacked: The Subtle Art of Phishing Through Familiar Facadesplus-squarewww.group-ib.com🃏Joker@sh.itjust.works · 22 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 21 hours agoTeaching an Old Framework New Tricks: The Dangers of Windows UI Automationwww.akamai.comexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkTeaching an Old Framework New Tricks: The Dangers of Windows UI Automationwww.akamai.com🃏Joker@sh.itjust.works · 21 hours agomessage-square0fedilink
shellsharks@infosec.pubM · 23 hours agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square0fedilinkarrow-up14
arrow-up14message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 23 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 24 hours agoLikely China-based Attackers Target High-profile Organizations in Southeast Asiaplus-squarewww.security.comexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkLikely China-based Attackers Target High-profile Organizations in Southeast Asiaplus-squarewww.security.com🃏Joker@sh.itjust.works · 24 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day agoLaw enforcement shuts down 27 DDoS booters ahead of annual Christmas attacksplus-squarewww.europol.europa.euexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkLaw enforcement shuts down 27 DDoS booters ahead of annual Christmas attacksplus-squarewww.europol.europa.eu🃏Joker@sh.itjust.works · 1 day agomessage-square0fedilink
🃏Joker@sh.itjust.works · edit-21 day agoSilent Push Unwraps the AIZ—Aggressive Inventory Zombies—Retail & Crypto Phishing Network Campaignplus-squarewww.silentpush.comexternal-linkmessage-square0fedilinkarrow-up17
arrow-up17external-linkSilent Push Unwraps the AIZ—Aggressive Inventory Zombies—Retail & Crypto Phishing Network Campaignplus-squarewww.silentpush.com🃏Joker@sh.itjust.works · edit-21 day agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day agoOperation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelsplus-squarewww.sentinelone.comexternal-linkmessage-square0fedilinkarrow-up18
arrow-up18external-linkOperation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelsplus-squarewww.sentinelone.com🃏Joker@sh.itjust.works · 1 day agomessage-square0fedilink
🃏Joker@sh.itjust.works · edit-21 day agoAnalysis of Nova: A Snake Keylogger Forkplus-squareany.runexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkAnalysis of Nova: A Snake Keylogger Forkplus-squareany.run🃏Joker@sh.itjust.works · edit-21 day agomessage-square0fedilink