TuxBot@infosec.pubMBEnglish · 28 days agoLinux Detection Engineering - A Sequel on Persistence Mechanismsplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkLinux Detection Engineering - A Sequel on Persistence Mechanismsplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoCISA Releases Twenty-One Industrial Control Systems Advisoriesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkCISA Releases Twenty-One Industrial Control Systems Advisoriesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoGoogle Scholar has a 'verified email' for Sir Isaac Newtonplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkGoogle Scholar has a 'verified email' for Sir Isaac Newtonplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoInside SnipBot: The Latest RomCom Malware Variantplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkInside SnipBot: The Latest RomCom Malware Variantplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoThreat landscape for industrial automation systems, Q2 2024plus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThreat landscape for industrial automation systems, Q2 2024plus-squaresecurelist.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThis Windows PowerShell Phish Has Scary Potentialplus-squarekrebsonsecurity.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoAlabama Man Arrested for SEC Account Takeover that Manipulated Bitcoin Pricesplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAlabama Man Arrested for SEC Account Takeover that Manipulated Bitcoin Pricesplus-squarethecyberexpress.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoBeware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaignplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBeware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaignplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoInstituto Nacional de Deportes de Chile - 319,613 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInstituto Nacional de Deportes de Chile - 319,613 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoCVE-2024-43578 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCVE-2024-43578 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoMDR in Action: Preventing The More_eggs Backdoor From Hatchingplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMDR in Action: Preventing The More_eggs Backdoor From Hatchingplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
sv1sjp@lemmy.worldMEnglish · 28 days agoUse Case: Bypassing In-App Purchase By Payment Client-Side Validationplus-squaresecfathy0x1.medium.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkUse Case: Bypassing In-App Purchase By Payment Client-Side Validationplus-squaresecfathy0x1.medium.comsv1sjp@lemmy.worldMEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoDistributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Mediaplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkDistributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Mediaplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoMicrosoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platformsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down12
arrow-up1-1arrow-down1external-linkMicrosoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platformsplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoInsights on Cyber Threats Targeting Users and Enterprises in Mexicoplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInsights on Cyber Threats Targeting Users and Enterprises in Mexicoplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoElastic releases the Detection Engineering Behavior Maturity Modelplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkElastic releases the Detection Engineering Behavior Maturity Modelplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBest Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookiesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 28 days agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoMicrosoft creates fake Azure tenants to pull phishers into honeypotsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkMicrosoft creates fake Azure tenants to pull phishers into honeypotsplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoInvestigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper Dzplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkInvestigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper Dzplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 28 days agoCrypto platform Radiant Capital says $50 million in digital coins stolen following account compromisesplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkCrypto platform Radiant Capital says $50 million in digital coins stolen following account compromisesplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 28 days agomessage-square0fedilink