@anon
sign up
@anon
sign up
North Korean hackers exploit Chrome zero-day to deploy rootkit
www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-chrome-zero-day-to-deploy-rootkit/
0 sats
\
0 comments
\
@ch0k1
31 Aug
security
related
Operation Triangulation: The last (hardware) mystery
securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
3855 sats
\
7 comments
\
@k00b
28 Dec 2023
security
GrapheneOS: News update regarding vulnerabilities reported to Google
1331 sats
\
3 comments
\
@final
8 Mar
security
Three Million Malware — Infected Smart Toothbrushes Used in Swiss DDoS Attacks
www.tomshardware.com/networking/three-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages
1939 sats
\
4 comments
\
@0xbitcoiner
6 Feb
security
Hackers Force Chrome Users To Hand Over Google Passwords, Here’s How
www.forbes.com/sites/daveywinder/2024/09/16/hackers-force-chrome-users-to-hand-over-google-passwords-heres-how/
244 sats
\
0 comments
\
@ch0k1
16 Sep
security
Chinese organizations are being hit by Cobalt Strike malware from within China
www.techradar.com/pro/security/chinese-organizations-are-being-hit-by-cobalt-strike-malware-from-within-china
311 sats
\
2 comments
\
@ch0k1
4 Sep
news
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
www.wired.com/story/jia-tan-xz-backdoor/
523 sats
\
2 comments
\
@ch0k1
3 Apr
security
Google Chrome "SymStealer" Vulnerability (CVE-2022-3656), Fixed in Chrome v108
www.imperva.com/blog/google-chrome-symstealer-vulnerability
710 sats
\
3 comments
\
@cryptocoin
14 Jan 2023
bitcoin
OnionPoison: infected Tor Browser installer distributed through YouTube channel
securelist.com/onionpoison-infected-tor-browser-installer-youtube/107627/
368 sats
\
1 comment
\
@cryptocoin
5 Oct 2022
bitcoin
Chrome Canary just killed uBlock Origin and other Manifest V2 extensions
www.androidpolice.com/chrome-canary-manifest-v2-extensions-ad-blockers-gone/
366 sats
\
1 comment
\
@beorange
6 Oct
tech
North Korean hackers deploy ‘Durian’ malware, targeting crypto firms
cointelegraph.com/news/north-korean-hackers-deploy-durian-malware-targeting-south-korean-crypto-firms
64 sats
\
2 comments
\
@ch0k1
13 May
security
Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
archive.is/eT4nP
262 sats
\
0 comments
\
@StillStackinAfterAllTheseYears
4 Apr
security
Browser companies patch critical zero-day vulnerability | TechTarget
www.techtarget.com/searchsecurity/news/366551978/Browser-companies-patch-critical-zero-day-vulnerability
1728 sats
\
0 comments
\
@AR0w
15 Sep 2023
tech
Magnet Goblin hackers use 1-day flaws to drop custom Linux malware
www.bleepingcomputer.com/news/security/magnet-goblin-hackers-use-1-day-flaws-to-drop-custom-linux-malware/
61 sats
\
2 comments
\
@ch0k1
9 Mar
security
Massive China-State IoT Botnet Went Undetected For Four Years — Until Now
239 sats
\
5 comments
\
@0xbitcoiner
19 Sep
security
37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers
www.youtube.com/watch?v=1f6YyH62jFE
896 sats
\
4 comments
\
@ek
29 Dec 2023
security
freebie
Critical vulnerability affecting most Linux distros allows for bootkits
arstechnica.com/security/2024/02/critical-vulnerability-affecting-most-linux-distros-allows-for-bootkits/
976 sats
\
0 comments
\
@ch0k1
7 Feb
security
'World's largest botnet' taken down, Chinese mastermind arrested
news.sky.com/story/worlds-largest-botnet-taken-down-as-alleged-chinese-mastermind-arrested-and-29m-in-cryptocurrency-seized-13145394
185 sats
\
0 comments
\
@ch0k1
30 May
news
Google warns of actively exploited Pixel firmware zero-day
www.bleepingcomputer.com/news/security/google-warns-of-actively-exploited-pixel-firmware-zero-day/
316 sats
\
1 comment
\
@siggy47
13 Jun
tech
Tor Browser, Tails Issued Patches for WebP Critical Zero-Day Exploit
www.nobsbitcoin.com/tor-tails-issue-patches-for-webp-critical-zero-day-exploit-affecting-major-browsers/
858 sats
\
0 comments
\
@BitcoinIsTheFuture
15 Sep 2023
bitcoin
LLM Agents can Autonomously Hack Websites
arxiv.org/pdf/2402.06664.pdf
464 sats
\
2 comments
\
@doofus
25 Feb
security
Account compromise of “unprecedented scale” uses everyday home devices
arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
305 sats
\
0 comments
\
@nym
29 Apr
security
more