c0mmando@links.hackliberty.orgM · 1 year agoBadBazaar espionage tool targets Android users via trojanized Signal and Telegram appsplus-squarewww.welivesecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBadBazaar espionage tool targets Android users via trojanized Signal and Telegram appsplus-squarewww.welivesecurity.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoSapphireStealer: Open-source information stealer enables credential and data theftplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSapphireStealer: Open-source information stealer enables credential and data theftplus-squareblog.talosintelligence.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoInfamous Chisel Malware Analysis Reportwww.cisa.govexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInfamous Chisel Malware Analysis Reportwww.cisa.govc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoChinese law enforcement linked to largest covert influence operation ever discoveredplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese law enforcement linked to largest covert influence operation ever discoveredplus-squaretherecord.mediac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoFBI-led 'Operation Duck Hunt' takes down Qakbotplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI-led 'Operation Duck Hunt' takes down Qakbotplus-squarewww.theregister.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoUnmasking Trickbot, One of the World’s Top Cybercrime Gangsplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnmasking Trickbot, One of the World’s Top Cybercrime Gangsplus-squarewww.wired.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoNetwork technology giant Juniper warns users about denial-of-service bugsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNetwork technology giant Juniper warns users about denial-of-service bugsplus-squaretherecord.mediac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoNetgear releases patches for two high-severity vulnerabilitiesplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNetgear releases patches for two high-severity vulnerabilitiesplus-squaretherecord.mediac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
videodrome@lemmy.capebreton.social · 1 year agoWho Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Adviceplus-squarewww.usenix.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWho Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Adviceplus-squarewww.usenix.orgvideodrome@lemmy.capebreton.social · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year ago‘Incredible concern and anger’ among Metropolitan Police after hackers breach dataplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link‘Incredible concern and anger’ among Metropolitan Police after hackers breach dataplus-squaretherecord.mediac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoLazarus Group's infrastructure reuse leads to discovery of new malwareplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLazarus Group's infrastructure reuse leads to discovery of new malwareplus-squareblog.talosintelligence.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoFBI fingers China for attacks on Barracuda email appliancesplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI fingers China for attacks on Barracuda email appliancesplus-squarego.theregister.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoBritish court convicts two teen Lapsus$ members of hacking tech firmsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBritish court convicts two teen Lapsus$ members of hacking tech firmsplus-squaretherecord.mediac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoNorth Korea’s Lazarus hackers behind recent crypto heists: FBIplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNorth Korea’s Lazarus hackers behind recent crypto heists: FBIplus-squaretherecord.mediac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoCanary Tokens to Catch Network Intrudersplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCanary Tokens to Catch Network Intrudersplus-squarekrebsonsecurity.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoMillions stolen from crypto platforms Exactly Protocol and Harbor Protocolplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMillions stolen from crypto platforms Exactly Protocol and Harbor Protocolplus-squaretherecord.mediac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoWinRAR vuln could allow code to run when files are openedplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWinRAR vuln could allow code to run when files are openedplus-squarewww.theregister.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoLeak of 75k staff records was insiders' fault, Tesla claimsplus-squarego.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLeak of 75k staff records was insiders' fault, Tesla claimsplus-squarego.theregister.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year agoAlarm raised over broken authorization in Mozilla VPN clientplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAlarm raised over broken authorization in Mozilla VPN clientplus-squarewww.theregister.comc0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink
c0mmando@links.hackliberty.orgM · 1 year ago“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdroppingplus-squarecitizenlab.caexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdroppingplus-squarecitizenlab.cac0mmando@links.hackliberty.orgM · 1 year agomessage-square0fedilink