Kid@sh.itjust.worksMEnglish · 3 hours agoAMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUsplus-squarethehackernews.comexternal-linkmessage-square2fedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkAMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square2fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoMcDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekersplus-squarehackread.comexternal-linkmessage-square4fedilinkarrow-up176arrow-down10
arrow-up176arrow-down1external-linkMcDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekersplus-squarehackread.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square4fedilink
Kid@sh.itjust.worksMEnglish · 1 hour agoRowhammer Attack Demonstrated Against Nvidia GPU - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkRowhammer Attack Demonstrated Against Nvidia GPU - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 1 hour agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 1 hour agoTikTok Faces Fresh European Privacy Investigation Over China Data Transfers - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkTikTok Faces Fresh European Privacy Investigation Over China Data Transfers - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 53 minutes agoCritical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wildplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCritical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wildplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 53 minutes agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoeSIM Hack Allows for Cloning, Spying - SecurityWeekplus-squarewww.securityweek.comexternal-linkmessage-square1fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkeSIM Hack Allows for Cloning, Spying - SecurityWeekplus-squarewww.securityweek.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoUK Arrests Four in ‘Scattered Spider’ Ransom Group – Krebs on Securityplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkUK Arrests Four in ‘Scattered Spider’ Ransom Group – Krebs on Securityplus-squarekrebsonsecurity.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 hour agoIranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminalsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkIranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminalsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 2 hours agoNew AI Malware PoC Reliably Evades Microsoft Defenderplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNew AI Malware PoC Reliably Evades Microsoft Defenderplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 2 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 1 hour agoWindows 11 now uses JScript9Legacy engine for improved securityplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows 11 now uses JScript9Legacy engine for improved securityplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 1 hour agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoPalo Alto Networks GlobalProtect Vulnerability Enabling Root-Level Accessgbhackers.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkPalo Alto Networks GlobalProtect Vulnerability Enabling Root-Level Accessgbhackers.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoSeven Healthcare Organizations Added to Ransomware Groups’ Data Leak Sitesplus-squarewww.hipaajournal.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkSeven Healthcare Organizations Added to Ransomware Groups’ Data Leak Sitesplus-squarewww.hipaajournal.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoGreyNoise Identifies New Scraper Botnet Concentrated in Taiwanplus-squarewww.greynoise.ioexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGreyNoise Identifies New Scraper Botnet Concentrated in Taiwanplus-squarewww.greynoise.ioKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoSafePay Ransomware Uses RDP and VPN Access to Infiltrate Organizational Networksgbhackers.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSafePay Ransomware Uses RDP and VPN Access to Infiltrate Organizational Networksgbhackers.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoCustomer, Employee Data Exposed in Nippon Steel Breachplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCustomer, Employee Data Exposed in Nippon Steel Breachplus-squarewww.darkreading.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoCISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprisesplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprisesplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 4 hours agoPerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda carsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda carsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 4 hours agomessage-square1fedilink
Kid@sh.itjust.worksMEnglish · 3 hours agoCritical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloadsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkCritical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloadsplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 3 hours agomessage-square0fedilink
PhilipTheBucket@ponder.catEnglish · 3 days agoBrowser hijacking campaign infects 2.3M Chrome, Edge usersplus-squarewww.theregister.comexternal-linkmessage-square7fedilinkarrow-up174arrow-down10
arrow-up174arrow-down1external-linkBrowser hijacking campaign infects 2.3M Chrome, Edge usersplus-squarewww.theregister.comPhilipTheBucket@ponder.catEnglish · 3 days agomessage-square7fedilink
Kid@sh.itjust.worksMEnglish · 1 day agoMore than $40 million stolen from GMX crypto platform | The Record from Recorded Future Newsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkMore than $40 million stolen from GMX crypto platform | The Record from Recorded Future Newsplus-squaretherecord.mediaKid@sh.itjust.worksMEnglish · 1 day agomessage-square0fedilink