TuxBot@infosec.pubMBEnglish · 57 minutes agoTrustwave SpiderLabs Research: 20% of Ransomware Attacks in Financial Services Target Banking Institutionsplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrustwave SpiderLabs Research: 20% of Ransomware Attacks in Financial Services Target Banking Institutionsplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 57 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoMicrosoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platformsplus-squarewww.microsoft.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkMicrosoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platformsplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square2fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoMore than two dozen countries have used internet outages to sway elections: reportplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkMore than two dozen countries have used internet outages to sway elections: reportplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoAnnouncing the 11th Annual Flare-On Challengeplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing the 11th Annual Flare-On Challengeplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoCISA Releases Two Industrial Control Systems Advisoriesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCISA Releases Two Industrial Control Systems Advisoriesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoFinland seizes servers of 'Sipultie' dark web drugs marketplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkFinland seizes servers of 'Sipultie' dark web drugs marketplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoTimeshare Owner? The Mexican Drug Cartels Want Youplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTimeshare Owner? The Mexican Drug Cartels Want Youplus-squarekrebsonsecurity.comTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoContagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malwareplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkContagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malwareplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 11 hours agoDistributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Mediaplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkDistributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Mediaplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 11 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 8 hours agoAwaken Likho is awake: new techniques of an APT groupplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAwaken Likho is awake: new techniques of an APT groupplus-squaresecurelist.comTuxBot@infosec.pubMBEnglish · 8 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 9 hours agoTrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patternsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkTrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patternsplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 9 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 10 hours agoCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCVE-2024-38139 Microsoft Dataverse Elevation of Privilege Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 10 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 9 hours agoChina Says Volt Typhoon Is U.S. Espionage and Disinformation Campaignplus-squarethecyberexpress.comexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkChina Says Volt Typhoon Is U.S. Espionage and Disinformation Campaignplus-squarethecyberexpress.comTuxBot@infosec.pubMBEnglish · 9 hours agomessage-square1fedilink
TuxBot@infosec.pubMBEnglish · 13 hours agoCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up18arrow-down12
arrow-up16arrow-down1external-linkCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 13 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 10 hours agoGames Box - 1,439,354 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkGames Box - 1,439,354 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 10 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 11 hours agoStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 11 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 12 hours agoAn Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Readerplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAn Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Readerplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 12 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 11 hours agoEarth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusionplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEarth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusionplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 11 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 16 hours agoEDRSilencer red team tool used in attacks to bypass securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkEDRSilencer red team tool used in attacks to bypass securityplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 16 hours agomessage-square0fedilink