Amoxtli@thelemmy.clubEnglish · 19 days agoNew Microsoft Data Security Index report explores secure AI adoption to protect sensitive data | Microsoft Security Blogplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkNew Microsoft Data Security Index report explores secure AI adoption to protect sensitive data | Microsoft Security Blogplus-squarewww.microsoft.comAmoxtli@thelemmy.clubEnglish · 19 days agomessage-square0fedilink
Tony Bark@pawb.socialEnglish · 19 days agoExposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Siteplus-squarewww.404media.coexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkExposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Siteplus-squarewww.404media.coTony Bark@pawb.socialEnglish · 19 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoAndroid Trojan Campaign Uses Hugging Face Hosting for RAT Payload Deliveryplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkAndroid Trojan Campaign Uses Hugging Face Hosting for RAT Payload Deliveryplus-squarewww.bitdefender.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · edit-220 days agoBragging hackers unintentionally expose $60M theft from US government crypto walletsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkBragging hackers unintentionally expose $60M theft from US government crypto walletsplus-squarecybernews.comKid@sh.itjust.worksMEnglish · edit-220 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoOperation Winter SHIELD: FBI Issues Cyber Call to Arms - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkOperation Winter SHIELD: FBI Issues Cyber Call to Arms - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 20 days agoIvanti warns of two EPMM flaws exploited in zero-day attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkIvanti warns of two EPMM flaws exploited in zero-day attacksplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 20 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · edit-220 days agoGoogle fixes high-severity Chrome bug that may abuse background downloadsplus-squarecybernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkGoogle fixes high-severity Chrome bug that may abuse background downloadsplus-squarecybernews.comKid@sh.itjust.worksMEnglish · edit-220 days agomessage-square0fedilink
Birdies-Labs@lemmus.orgEnglish · 21 days agothoughts on this insider threat case?plus-squarelemmus.orgimagemessage-square0fedilinkarrow-up11
arrow-up11imagethoughts on this insider threat case?plus-squarelemmus.orgBirdies-Labs@lemmus.orgEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoFrance Fines National Employment Agency €5m Over 2024 Data Breach - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkFrance Fines National Employment Agency €5m Over 2024 Data Breach - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoRansomware Victim Numbers Rise, Despite Drop in Active Extortion Group - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkRansomware Victim Numbers Rise, Despite Drop in Active Extortion Group - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoAisuru botnet sets new record with 31.4 Tbps DDoS attackplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkAisuru botnet sets new record with 31.4 Tbps DDoS attackplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
Nemeski@piefed.socialEnglish · 21 days agoSignal president warns AI agents are making encryption irrelevantplus-squarecyberinsider.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSignal president warns AI agents are making encryption irrelevantplus-squarecyberinsider.comNemeski@piefed.socialEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days ago'AI-Powered' Services Firm Says Hack Affects 3.1Mplus-squarewww.bankinfosecurity.inexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-link'AI-Powered' Services Firm Says Hack Affects 3.1Mplus-squarewww.bankinfosecurity.inKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoTwo High-Severity n8n Flaws Allow Authenticated Remote Code Executionplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkTwo High-Severity n8n Flaws Allow Authenticated Remote Code Executionplus-squarethehackernews.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoSolarWinds warns of critical Web Help Desk RCE, auth bypass flawsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSolarWinds warns of critical Web Help Desk RCE, auth bypass flawsplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoAI's appetite for data is testing enterprise guardrails - Help Net Securityplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkAI's appetite for data is testing enterprise guardrails - Help Net Securityplus-squarewww.helpnetsecurity.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 21 days agoeScan confirms update server breached to push malicious updateplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkeScan confirms update server breached to push malicious updateplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 21 days agomessage-square0fedilink
BigHeadMode@lemmy.frozeninferno.xyzEnglish · 22 days agoFollow Up: PGP vs. HTTPS for Software Authenticityplus-squaremessage-squaremessage-square0fedilinkarrow-up11
arrow-up11message-squareFollow Up: PGP vs. HTTPS for Software Authenticityplus-squareBigHeadMode@lemmy.frozeninferno.xyzEnglish · 22 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 days agoHackers hijack exposed LLM endpoints in Bizarre Bazaar operationplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHackers hijack exposed LLM endpoints in Bizarre Bazaar operationplus-squarewww.bleepingcomputer.comKid@sh.itjust.worksMEnglish · 22 days agomessage-square0fedilink
Kid@sh.itjust.worksMEnglish · 22 days agoResearchers Uncover 454,000+ Malicious Open Source Packages - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkResearchers Uncover 454,000+ Malicious Open Source Packages - Infosecurity Magazineplus-squarewww.infosecurity-magazine.comKid@sh.itjust.worksMEnglish · 22 days agomessage-square0fedilink