/f/research
- Researchers Exposed Predator Spyware Infrastructure & Domains Associated
_gbhackers.com
-
|
posted in
rouiejay12
|
- The Hidden Injustice of Cyberattacks
_wired.com
-
|
posted in
rouiejay12
|
- How 3 Million ‘Hacked’ Toothbrushes Became a Cyber Urban Legend
_wired.com
-
|
posted in
rouiejay12
|
- The fight against commercial spyware misuse is heating up
_helpnetsecurity.com
-
|
posted in
rouiejay12
|
- Attack of the copycats: How impostor apps and fake app mods could bite you
_welivesecurity.com
-
|
posted in
rouiejay12
|
- Cloud squatting: How attackers can use deleted cloud assets against you
_csoonline.com
-
|
posted in
rouiejay12
|
- Researcher discovered a new lock screen bypass bug for Android 14 and 13
_securityaffairs.com
-
|
posted in
rouiejay12
|
- Employees breaking security policies just dangerous as being hacked, Kaspersky global study shows
_itsecurityguru.org
-
|
posted in
rouiejay12
|
- Why Botnets Persist: How to Stop Direct-Path DDoS Attacks
_securityboulevard.com
-
|
posted in
rouiejay12
|
- Software vulnerabilities are declining, but third-party risks still linger
_itpro.com
-
|
posted in
rouiejay12
|
- CherryBlos, the malware that steals cryptocurrency via your photos - what you need to know
_tripwire.com
-
|
posted in
rouiejay12
|
- Who’s Behind the SWAT USA Reshipping Service?
_krebsonsecurity.com
-
|
posted in
rouiejay12
|
- Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date
_techrepublic.com
-
|
posted in
rouiejay12
|
- Step-by-step through the Money Message ransomware
_news.sophos.com
-
|
posted in
rouiejay12
|
- Cloudflare: Sees an increase in hyper-volumetric HTTP DDoS attacks
_en.secnews.gr
-
|
posted in
rouiejay12
|
- Salt Security Discovers Flaws in Social Login Mechanism Impacting Thousands of Websites and Exposing Billions of Users to Account Takeover
_itsecurityguru.org
-
|
posted in
rouiejay12
|
- SolarWinds: Serious RCE vulnerabilities discovered
_en.secnews.gr
-
|
posted in
rouiejay12
|
- Researchers uncover DarkGate malware's Vietnamese connection
_helpnetsecurity.com
-
|
posted in
rouiejay12
|
- Research Reveals Vast Majority of Organisations Report DevOps Delays Due to Critical Security Issues
_itsecurityguru.org
-
|
posted in
rouiejay12
|
- Rezilion Researchers Uncover New Details on Severity of Google Chrome Zero-Day Vulnerability (CVE-2023-4863)
_securityboulevard.com
-
|
posted in
rouiejay12
|
- Snatch ransomware - what you need to know
_tripwire.com
-
|
posted in
rouiejay12
|
- Who’s Behind the 8Base Ransomware Website?
_krebsonsecurity.com
-
|
posted in
rouiejay12
|
- Generative AI Adoption Surges in Software Development Despite Security Risks, Sonatype Research Finds
_itsecurityguru.org
-
|
posted in
rouiejay12
|
- Researchers identify high-grade phishing kits attacking nearly 60,000 Microsoft 365 accounts
_cyberscoop.com
-
|
posted in
rouiejay12
|
- Australian Data Breach Costs are Rising — What Can IT Leaders Do?
_techrepublic.com
-
|
posted in
rouiejay12
|
- Researchers identify high-grade phishing kits attacking nearly 60,000 Microsoft 365 accounts
_cyberscoop.com
-
|
posted in
rouiejay12
|
- Japanese agency discovers malicious PDF that bypasses detection
_cybernews.com
-
|
posted in
rouiejay12
|
- Detecting Malware Through Hardware-Integrated Protection
_homelandsecuritynewswire.com
-
|
posted in
rouiejay12
|
- New Study Sheds Light on ADHUBLLKA Ransomware Network
_infosecurity-magazine.com
-
|
posted in
rouiejay12
|
- Researchers Uncovered the Developer of CypherRAT and CraxsRAT
_gbhackers.com
-
|
posted in
rouiejay12
|
- How a hacking crew overtook a satellite from inside a Las Vegas convention center and won $50,000
_cyberscoop.com
-
|
posted in
rouiejay12
|
- “Snakes in airplane mode” – what if your phone says it’s offline but isn’t?
_nakedsecurity.sophos.com
-
|
posted in
rouiejay12
|
- The Plan to Better Protect US Hospitals From Ransomware
_wired.com
-
|
posted in
rouiejay12
|
- How to hack casino card-shuffling machines
_bitdefender.com
-
|
posted in
rouiejay12
|
- New Study Backs An Identity-First and Inside-Out Approach to Cloud Security
_securityboulevard.com
-
|
posted in
rouiejay12
|
- How Malicious Android Apps Slip Into Disguise
_krebsonsecurity.com
-
|
posted in
rouiejay12
|
- Zenbleed: How the quest for CPU performance could put your passwords at risk
_nakedsecurity.sophos.com
-
|
posted in
rouiejay12
|
- Who and What is Behind the Malware Proxy Service SocksEscort?
_krebsonsecurity.com
-
|
posted in
rouiejay12
|
- Zero trust rated as highly effective by businesses worldwide
_helpnetsecurity.com
-
|
posted in
rouiejay12
|
- Google Virus Total leaks list of spooky email addresses
_nakedsecurity.sophos.com
-
|
posted in
rouiejay12
|