🃏Joker@sh.itjust.works · edit-213 hours agoNotorious Ursnif Banking Trojan Uses Stealthy Memory Execution To Avoid Detectionplus-squarecyble.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNotorious Ursnif Banking Trojan Uses Stealthy Memory Execution To Avoid Detectionplus-squarecyble.com🃏Joker@sh.itjust.works · edit-213 hours agomessage-square1fedilink
🃏Joker@sh.itjust.works · 11 hours agoBigger and badder: how DDoS attack sizes have evolved over the last decadeplus-squareblog.cloudflare.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkBigger and badder: how DDoS attack sizes have evolved over the last decadeplus-squareblog.cloudflare.com🃏Joker@sh.itjust.works · 11 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 12 hours agoSouth Asian hackers target Pakistani entities in new espionage campaignplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkSouth Asian hackers target Pakistani entities in new espionage campaignplus-squaretherecord.media🃏Joker@sh.itjust.works · 12 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 18 hours agoCyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacksplus-squarewww.sentinelone.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkCyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacksplus-squarewww.sentinelone.com🃏Joker@sh.itjust.works · 18 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 16 hours agoFinding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platformplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkFinding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platformplus-squareblog.talosintelligence.com🃏Joker@sh.itjust.works · 16 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 23 hours agoMicrosoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCONplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkMicrosoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCONplus-squarewww.microsoft.com🃏Joker@sh.itjust.works · 23 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 18 hours agoGame of Emperor: Unveiling Long Term Earth Estries Cyber Intrusionsplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGame of Emperor: Unveiling Long Term Earth Estries Cyber Intrusionsplus-squarewww.trendmicro.com🃏Joker@sh.itjust.works · 18 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 16 hours agoPerfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and Proxyjackingplus-squaresocradar.ioexternal-linkmessage-square1fedilinkarrow-up14arrow-down14
arrow-up10arrow-down1external-linkPerfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and Proxyjackingplus-squaresocradar.io🃏Joker@sh.itjust.works · 16 hours agomessage-square1fedilink
🃏Joker@sh.itjust.works · 2 days agoMajor cybercrime crackdowns signal shift in global cybersecurity strategiesplus-squaretheconversation.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkMajor cybercrime crackdowns signal shift in global cybersecurity strategiesplus-squaretheconversation.com🃏Joker@sh.itjust.works · 2 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · edit-23 days agoAndrew Tate's The Real World breached.plus-squareddosecrets.comexternal-linkmessage-square0fedilinkarrow-up134arrow-down15
arrow-up129arrow-down1external-linkAndrew Tate's The Real World breached.plus-squareddosecrets.com🃏Joker@sh.itjust.works · edit-23 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 3 days agoKC Man Indicted for Computer Hackingplus-squarewww.justice.govexternal-linkmessage-square3fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkKC Man Indicted for Computer Hackingplus-squarewww.justice.gov🃏Joker@sh.itjust.works · 3 days agomessage-square3fedilink
🃏Joker@sh.itjust.works · 4 days agoMicrosoft seizes 240 websites used by Egyptian phishing-as-a-service operation.plus-squareblogs.microsoft.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkMicrosoft seizes 240 websites used by Egyptian phishing-as-a-service operation.plus-squareblogs.microsoft.com🃏Joker@sh.itjust.works · 4 days agomessage-square1fedilink
🃏Joker@sh.itjust.works · edit-24 days agoLateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examplesplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkLateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examplesplus-squareunit42.paloaltonetworks.com🃏Joker@sh.itjust.works · edit-24 days agomessage-square0fedilink
shellsharks@infosec.pubM · 6 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square7fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 6 days agomessage-square7fedilink
🃏Joker@sh.itjust.works · 5 days agoThe Philippine army is recruiting young tech civilians to fight cyber attacksplus-squarerestofworld.orgexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkThe Philippine army is recruiting young tech civilians to fight cyber attacksplus-squarerestofworld.org🃏Joker@sh.itjust.works · 5 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 3 days agoEnhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in imagesplus-squarecybersecurity.springeropen.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEnhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in imagesplus-squarecybersecurity.springeropen.com🃏Joker@sh.itjust.works · 3 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 4 days agoRussia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPYplus-squarewww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkRussia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPYplus-squarewww.recordedfuture.com🃏Joker@sh.itjust.works · 4 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 3 days agoThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.com🃏Joker@sh.itjust.works · 3 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 5 days agoFinancially Motivated Threat Actor Leveraged Google Docs and Weebly Services to Target Telecom and Financial Sectorsplus-squareblog.eclecticiq.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkFinancially Motivated Threat Actor Leveraged Google Docs and Weebly Services to Target Telecom and Financial Sectorsplus-squareblog.eclecticiq.com🃏Joker@sh.itjust.works · 5 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 5 days agoJustice Department Seizes Cybercrime Website and Charges Its Administratorsplus-squarewww.justice.govexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkJustice Department Seizes Cybercrime Website and Charges Its Administratorsplus-squarewww.justice.gov🃏Joker@sh.itjust.works · 5 days agomessage-square0fedilink