/f/threats

SEOStack Keyword Tool Contains Malware _sensorstechforum.com
| posted in rouiejay12 No comments |
1

North Korean hackers mix code from proven malware campaigns to avoid detection _csoonline.com
| posted in rouiejay12 No comments |
1

CISA Warns Congress on Chemical Industry Terror Attacks _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

The RAT King “NetSupport RAT” is Back in Action Via fake browser updates _gbhackers.com
| posted in rouiejay12 No comments |
1

Employees breaking security policies just dangerous as being hacked, Kaspersky global study shows _itsecurityguru.org
| posted in rouiejay12 No comments |
1

New CPU Vulnerability Makes Virtual Machine Environments Vulnerable _homelandsecuritynewswire.com
| posted in rouiejay12 No comments |
1

New RaaS Player Hunters International Inherits Hive's Operation _sensorstechforum.com
| posted in rouiejay12 No comments |
1

FBI and CISA Say the Royal Ransomware Group May Rebrand _securityboulevard.com
| posted in rouiejay12 No comments |
1

FBI: Royal ransomware asked 350 victims to pay $275 million _bleepingcomputer.com
| posted in rouiejay12 No comments |
1

Pro-Palestinian hacking group evolves tactics amid war _cyberscoop.com
| posted in rouiejay12 No comments |
1

From ********* to EZacces$! Your Browser Extension Could Grab Your Password and Sensitive Info _homelandsecuritynewswire.com
| posted in rouiejay12 No comments |
1

Microsoft and SysAid Find Clop Malware Vulnerability _techrepublic.com
| posted in rouiejay12 No comments |
1

Actively exploited Atlassian Confluence bug elevated to maximum severity rating _scmagazine.com
| posted in rouiejay12 No comments |
1

New GootLoader Malware Variant Evades Detection and Spreads Rapidly _thehackernews.com
| posted in rouiejay12 No comments |
1

The Cloud has a serious and fragile vulnerability: Access Tokens _securityboulevard.com
| posted in rouiejay12 No comments |
1

KandyKorn macOS malware lobbed at blockchain engineers _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Kaspersky reveals 'elegant' malware resembling NSA code _cyberscoop.com
| posted in rouiejay12 No comments |
1

Citrix Bleed: Exploiting CVE-2023-4966 Vulnerability _sensorstechforum.com
| posted in rouiejay12 No comments |
1

Microsoft Warns as Scattered Spider Expands from SIM Swaps to Ransomware _thehackernews.com
| posted in rouiejay12 No comments |
1

IBM: ChatGPT-Generated Can Write Convincing Phishing Emails _securityboulevard.com
| posted in rouiejay12 No comments |
1

New England Biolabs leak sensitive data _cybernews.com
| posted in rouiejay12 No comments |
1

MI5 chief warns of Chinese cyber espionage reached an unprecedented scale _securityaffairs.com
| posted in rouiejay12 No comments |
1

KeePass Malicious Ads: Google Goof Permits Punycode Attacks Again _securityboulevard.com
| posted in rouiejay12 No comments |
1

Ragnar Locker “likely to rebrand” in wake of takedown _itpro.com
| posted in rouiejay12 No comments |
1

ENISA Warns of AI Manipulation Ahead of Upcoming European Elections _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Plastic surgeries warned by the FBI that they are being targeted by cybercriminals _tripwire.com
| posted in rouiejay12 No comments |
1

Synology NAS System Flaw Let Attackers Remotely Hijack the Admin Account _gbhackers.com
| posted in rouiejay12 No comments |
1

CIA exposed to intelligence interception due to X's URL bug _theregister.com
| posted in rouiejay12 No comments |
1

A New Protocol Vulnerability Will Haunt the Web for Years _wired.com
| posted in rouiejay12 No comments |
1

SMBs Struggle to Keep Pace with Cyber Security Threats _itsecurityguru.org
| posted in rouiejay12 No comments |
1

Largest-ever DDoS leverages zero-day vulnerability _cyberscoop.com
| posted in rouiejay12 No comments |
1

Critical Atlassian Confluence vulnerability exploited by state-backed threat actor _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

F5 Warns Australian IT of Social Engineering Risk Escalation Due to Generative AI _techrepublic.com
| posted in rouiejay12 No comments |
1

Report Explores UK Companies’ Struggle to Address Growing Cybersecurity Threats _tripwire.com
| posted in rouiejay12 No comments |
1

QakBot threat actors are still operational after the August takedown _securityaffairs.com
| posted in rouiejay12 No comments |
1

New EU vulnerability disclosure rules deemed an "unnecessary risk" _itpro.com
| posted in rouiejay12 No comments |
1

New Malware-as-a-Service Gains Traction Among Cybercriminals _heimdalsecurity.com
| posted in rouiejay12 No comments |
1

New 'Looney Tunables' Linux bug gives root on major distros _bleepingcomputer.com
| posted in rouiejay12 No comments |
1

Chinese Hackers Are Hiding in Routers in the US and Japan _wired.com
| posted in rouiejay12 No comments |
1

Lazarus impersonated Meta recruiter to breach Spanish aerospace firm _helpnetsecurity.com
| posted in rouiejay12 No comments |
1