sign up
sign up
sign up
sign up
pull down to refresh
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code
thehackernews.com/2025/08/attackers-abuse-velociraptor-forensic.html
160 sats
\
0 comments
\
@ch0k1
30 Aug 2025
security
related
Iran-Linked UNC1549 Hackers Target Middle East Aerospace & Defense Sectors
thehackernews.com/2024/02/iran-linked-unc1549-hackers-target.html
547 sats
\
0 comments
\
@doofus
29 Feb 2024
security
Distillation, Experimentation, and Integration of AI for Adversarial Use
cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use
335 sats
\
0 comments
\
@0xbitcoiner
13 Feb
AI
Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams
jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/
164 sats
\
1 comment
\
@nym
30 Apr 2024
security
FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks
thehackernews.com/2024/02/fbi-warns-us-healthcare-sector-of.html
140 sats
\
0 comments
\
@doofus
28 Feb 2024
security
Disrupting first reported AI-orchestrated cyber espionage campaign - Anthropic
www.anthropic.com/news/disrupting-AI-espionage
457 sats
\
1 comment
\
@Scoresby
13 Nov 2025
AI
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
142 sats
\
0 comments
\
@ch0k1
19 Nov 2024
security
SesameOp: Novel backdoor uses OpenAI Assistants API for command and control
www.microsoft.com/en-us/security/blog/2025/11/03/sesameop-novel-backdoor-uses-openai-assistants-api-for-command-and-control/
222 sats
\
0 comments
\
@0xbitcoiner
4 Nov 2025
AI
Hacking campaign compromised at least 16 Chrome browser extensions
securityaffairs.com/172491/hacking/chrome-browser-extensions-compromise.html
266 sats
\
0 comments
\
@nym
1 Jan 2025
security
Is the OSC Prepared for the New Regulatory Reality of the Cyber Resilience Act?
www.linuxfoundation.org/blog/unaware-and-uncertain-is-the-open-source-community-prepared-for-the-new-regulatory-reality-of-the-cyber-resilience-act
170 sats
\
0 comments
\
@0xbitcoiner
28 Mar 2025
Politics_And_Law
Cyberspies Hacked Cisco Firewalls to Access Government Networks
www.wired.com/story/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks/
48 sats
\
0 comments
\
@nym
25 Apr 2024
security
New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users
thehackernews.com/2024/03/new-phishing-kit-leverages-sms-voice.html
1414 sats
\
0 comments
\
@doofus
1 Mar 2024
security
The Pending OpenAI Internet Apocalypse
333 sats
\
2 comments
\
@Atreus
4 Apr 2023
bitcoin
Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload Delivery
www.bitdefender.com/en-us/blog/labs/android-trojan-campaign-hugging-face-hosting-rat-payload
130 sats
\
0 comments
\
@0xbitcoiner
29 Jan
AI
Account compromise of “unprecedented scale” uses everyday home devices
arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
315 sats
\
0 comments
\
@nym
29 Apr 2024
security
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains
cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
200 sats
\
0 comments
\
@0xbitcoiner
16 Oct 2025
security
The XZ Backdoor: Everything You Need to Know
www.wired.com/story/xz-backdoor-everything-you-need-to-know/#intcid=recommendations_wired-bottom-recirc-v4_cf3e2538-ba66-4408-a9c0-3af3ee784b35_similar2-3_fallback_cral2-2
74 sats
\
0 comments
\
@nym
25 Apr 2024
security
A Signal Update Fends Off a Phishing Technique Used in Russian Espionage
archive.is/kDfII
510 sats
\
1 comment
\
@ek
26 Mar 2025
security
Patch Tuesday brings 90 new Microsoft CVEs, six already under exploit
www.theregister.com/2024/08/14/august_patch_tuesday/
395 sats
\
0 comments
\
@dontforgetthekeys
14 Aug 2024
security
Not in The Prophecies: Practical Attacks on Nostr
crypto-sec-n.github.io/
4110 sats
\
7 comments
\
@ek
7 Aug 2025
nostr
Hackers Exploit Signal's Linked Devices Feature via Malicious QR Codes
thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html
500 sats
\
4 comments
\
@ch0k1
19 Feb 2025
security
Attackers are mapping your attack surface—are you?
www.bleepingcomputer.com/news/security/attackers-are-mapping-your-attack-surface-are-you/
215 sats
\
0 comments
\
@ch0k1
31 May 2025
security
more