TuxBot@infosec.pubMBEnglish · 11 minutes agoContagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malwareplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkContagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malwareplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 11 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 1 hour agoBrazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breachplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBrazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breachplus-squarekrebsonsecurity.comTuxBot@infosec.pubMBEnglish · 1 hour agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 41 minutes agoHackers reportedly impersonate cyber firm ESET to target organizations in Israelplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers reportedly impersonate cyber firm ESET to target organizations in Israelplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 41 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 58 minutes agoAnalysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russiaplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russiaplus-squaresecurelist.comTuxBot@infosec.pubMBEnglish · 58 minutes agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoAnalyzing a Multi-Stage Malware Attack Targeting Digital Marketing Professionalsplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnalyzing a Multi-Stage Malware Attack Targeting Digital Marketing Professionalsplus-squarethecyberexpress.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 2 hours agoThe Ultimate DSPM Guide: Webinar on Building a Strong Data Security Postureplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkThe Ultimate DSPM Guide: Webinar on Building a Strong Data Security Postureplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 2 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoSwitch - 5,397 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSwitch - 5,397 breached accountsplus-squarehaveibeenpwned.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 3 hours agoCVE-2024-43566 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCVE-2024-43566 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerabilityplus-squaremsrc.microsoft.comTuxBot@infosec.pubMBEnglish · 3 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoWater Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malwareplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkWater Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malwareplus-squarewww.trendmicro.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoFBI arrest Alabama man suspected of hacking SEC's X accountplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkFBI arrest Alabama man suspected of hacking SEC's X accountplus-squarewww.bleepingcomputer.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkStorm-0501: Ransomware attacks expanding to hybrid cloud environmentsplus-squarewww.microsoft.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoCISA Releases Seven Industrial Control Systems Advisoriesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA Releases Seven Industrial Control Systems Advisoriesplus-squarewww.cisa.govTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
mwguy@infosec.pubEnglish · 2 days agoFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.comexternal-linkmessage-square4fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkFrom QR to compromise: The growing “quishing” threatplus-squarenews.sophos.commwguy@infosec.pubEnglish · 2 days agomessage-square4fedilink
TuxBot@infosec.pubMBEnglish · 7 hours agoInsurance giant Globe Life facing extortion attempts after data theft from subsidiaryplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkInsurance giant Globe Life facing extortion attempts after data theft from subsidiaryplus-squaretherecord.mediaTuxBot@infosec.pubMBEnglish · 7 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 4 hours agoShedding Light on Election Deepfakesplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkShedding Light on Election Deepfakesplus-squarewww.trustwave.comTuxBot@infosec.pubMBEnglish · 4 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 9 hours agoMicrosoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browserplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browserplus-squarethehackernews.comTuxBot@infosec.pubMBEnglish · 9 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 6 hours agoLynx Ransomware: A Rebranding of INC Ransomwareplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLynx Ransomware: A Rebranding of INC Ransomwareplus-squareunit42.paloaltonetworks.comTuxBot@infosec.pubMBEnglish · 6 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 11 hours agoEscalating cyber threats demand stronger global defense and cooperationplus-squareblogs.microsoft.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkEscalating cyber threats demand stronger global defense and cooperationplus-squareblogs.microsoft.comTuxBot@infosec.pubMBEnglish · 11 hours agomessage-square0fedilink
TuxBot@infosec.pubMBEnglish · 5 hours agoStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comTuxBot@infosec.pubMBEnglish · 5 hours agomessage-square0fedilink