🃏Joker@sh.itjust.works · 4 hours agoWhere There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0dayplus-squarelabs.watchtowr.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkWhere There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0dayplus-squarelabs.watchtowr.com🃏Joker@sh.itjust.works · 4 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 4 hours agoBlueAlpha Leverages Cloudflare Tunnels for GammaDrop Infrastructureplus-squarewww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBlueAlpha Leverages Cloudflare Tunnels for GammaDrop Infrastructureplus-squarewww.recordedfuture.com🃏Joker@sh.itjust.works · 4 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 8 hours agoThreat Actor Targets Manufacturing Industry With Malwareplus-squarecyble.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkThreat Actor Targets Manufacturing Industry With Malwareplus-squarecyble.com🃏Joker@sh.itjust.works · 8 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 8 hours ago(QR) Coding My Way Out of Here: C2 in Browser Isolation Environmentsplus-squarecloud.google.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-link(QR) Coding My Way Out of Here: C2 in Browser Isolation Environmentsplus-squarecloud.google.com🃏Joker@sh.itjust.works · 8 hours agomessage-square1fedilink
🃏Joker@sh.itjust.works · 8 hours agoMOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacksplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacksplus-squarewww.trendmicro.com🃏Joker@sh.itjust.works · 8 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 8 hours agoOperation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelsplus-squarewww.sentinelone.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkOperation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelsplus-squarewww.sentinelone.com🃏Joker@sh.itjust.works · 8 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 9 hours agoU.S. Organization in China Targeted by Attackersplus-squarewww.security.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkU.S. Organization in China Targeted by Attackersplus-squarewww.security.com🃏Joker@sh.itjust.works · 9 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 9 hours agoZero-Day: How Attackers Use Corrupted Files to Bypass Detectionplus-squareany.runexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkZero-Day: How Attackers Use Corrupted Files to Bypass Detectionplus-squareany.run🃏Joker@sh.itjust.works · 9 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 8 hours agoDroidBot: Insights from a new Turkish MaaS fraud operationplus-squarewww.cleafy.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkDroidBot: Insights from a new Turkish MaaS fraud operationplus-squarewww.cleafy.com🃏Joker@sh.itjust.works · 8 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 12 hours agoFraudulent shopping sites tied to cybercrime marketplace taken offlineplus-squarewww.europol.europa.euexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkFraudulent shopping sites tied to cybercrime marketplace taken offlineplus-squarewww.europol.europa.eu🃏Joker@sh.itjust.works · 12 hours agomessage-square1fedilink
🃏Joker@sh.itjust.works · 12 hours agoCloudflare’s pages.dev and workers.dev Domains Increasingly Abused forplus-squareemailsecurity.fortra.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkCloudflare’s pages.dev and workers.dev Domains Increasingly Abused forplus-squareemailsecurity.fortra.com🃏Joker@sh.itjust.works · 12 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 12 hours agoCrowdStrike IT Outage: Impacts to Public Safety Systems and Considerations for Congressplus-squarewww.everycrsreport.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCrowdStrike IT Outage: Impacts to Public Safety Systems and Considerations for Congressplus-squarewww.everycrsreport.com🃏Joker@sh.itjust.works · 12 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 22 hours agoNetSupport RAT and RMS in malicious emailsplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkNetSupport RAT and RMS in malicious emailsplus-squaresecurelist.com🃏Joker@sh.itjust.works · 22 hours agomessage-square0fedilink
🃏Joker@sh.itjust.works · 1 day agoiVerify Mobile Threat Investigation Uncovers New Pegasus Samplesplus-squareiverify.ioexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkiVerify Mobile Threat Investigation Uncovers New Pegasus Samplesplus-squareiverify.io🃏Joker@sh.itjust.works · 1 day agomessage-square0fedilink
🃏Joker@sh.itjust.works · edit-24 hours agoSnowblind: The Invisible Hand of Secret Blizzardplus-squareblog.lumen.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkSnowblind: The Invisible Hand of Secret Blizzardplus-squareblog.lumen.com🃏Joker@sh.itjust.works · edit-24 hours agomessage-square0fedilink
shellsharks@infosec.pubM · 1 day agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square1fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 1 day agomessage-square1fedilink
🃏Joker@sh.itjust.works · 3 days agoThe fascinating security model of dark web marketplacesplus-squareboehs.orgexternal-linkmessage-square11fedilinkarrow-up134arrow-down10
arrow-up134arrow-down1external-linkThe fascinating security model of dark web marketplacesplus-squareboehs.org🃏Joker@sh.itjust.works · 3 days agomessage-square11fedilink
🃏Joker@sh.itjust.works · 2 days agoNew era of slop security reports for open sourceplus-squaresethmlarson.devexternal-linkmessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkNew era of slop security reports for open sourceplus-squaresethmlarson.dev🃏Joker@sh.itjust.works · 2 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 2 days agoHello, this is your chatbot leaking: WotNot exposes 346K sensitive customer filesplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkHello, this is your chatbot leaking: WotNot exposes 346K sensitive customer filesplus-squarecybernews.com🃏Joker@sh.itjust.works · 2 days agomessage-square0fedilink
🃏Joker@sh.itjust.works · 2 days agoAd fraud on large online platformsplus-squarecert.plexternal-linkmessage-square1fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkAd fraud on large online platformsplus-squarecert.pl🃏Joker@sh.itjust.works · 2 days agomessage-square1fedilink