sign up
sign up
sign up
sign up
pull down to refresh
CISA: Hackers abuse F5 BIG-IP cookies to map internal servers
www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/
21 sats
\
0 comments
\
@Rsync25
11 Oct 2024
security
related
Hackers Abuse Cloudflare WARP To Hijack Cloud Services
cybersecuritynews.com/cloudflare-warp-hijack/
31 sats
\
0 comments
\
@ch0k1
25 Jul 2024
news
Hackers use DNS tunneling for network scanning, tracking victims
www.bleepingcomputer.com/news/security/hackers-use-dns-tunneling-for-network-scanning-tracking-victims/
22 sats
\
0 comments
\
@DEADBEEF
14 May 2024
security
ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers
thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html?m=1
40 sats
\
0 comments
\
@ch0k1
6 Mar 2025
security
Hackers Exploiting 3-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls
cybersecuritynews.com/fortigate-firewall-vulnerability/
67 sats
\
0 comments
\
@ch0k1
26 Dec 2025
news
Attackers are mapping your attack surface—are you?
www.bleepingcomputer.com/news/security/attackers-are-mapping-your-attack-surface-are-you/
115 sats
\
0 comments
\
@ch0k1
31 May 2025
security
Account compromise of “unprecedented scale” uses everyday home devices
arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
305 sats
\
0 comments
\
@nym
29 Apr 2024
security
Massive IP Spoofing attack targeting Tor Relay Operators
delroth.net/posts/spoofed-mass-scan-abuse/
1417 sats
\
4 comments
\
@eltordev
7 Nov 2024
security
New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations
cybersecuritynews.com/kerberos-relay-attack-uses-dns-cname/amp/
10 sats
\
0 comments
\
@ch0k1
20 Jan
news
Over 4,000 backdoors hijacked by registering expired domains
www.bleepingcomputer.com/news/security/over-4-000-backdoors-hijacked-by-registering-expired-domains/
311 sats
\
4 comments
\
@ch0k1
11 Jan 2025
security
200,000 Facebook Marketplace user records leaked on hacking forum
www.bleepingcomputer.com/news/security/200-000-facebook-marketplace-user-records-leaked-on-hacking-forum/
1417 sats
\
0 comments
\
@ch0k1
13 Feb 2024
security
New Attack Bypasses HTTP/2 Security for Arbitrary Cross-Site Scripting
cybersecuritynews.com/http-2-security-arbitrary-cross-site-scripting/
31 sats
\
0 comments
\
@ch0k1
29 May 2025
security
Cloudflare Zero-Day Vulnerability Enables Any Host Access Bypassing Protections
cybersecuritynews.com/cloudflare-zero-day-vulnerability/
10 sats
\
0 comments
\
@ch0k1
20 Jan
news
Exposed DeepSeek data base leaking sensitive information, including chat history
www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak
207 sats
\
1 comment
\
@NovaRift
30 Jan 2025
AI
CISA: Second SharePoint Flaw Disclosed at Pwn2Own Exploited in Attacks
www.securityweek.com/cisa-second-sharepoint-flaw-disclosed-at-pwn2own-exploited-in-attacks/amp/
21 sats
\
0 comments
\
@ch0k1
28 Mar 2024
security
supercookie: ⚠️ Browser fingerprinting via favicon - jonasstrehle
github.com/jonasstrehle/supercookie/
438 sats
\
12 comments
\
@Scoresby
16 Nov 2025
devs
“SubdoMailing” Hijacked Subdomains Sending Millions of Malicious Emails
103 sats
\
1 comment
\
@UCantDoThatDotRugged
27 Feb 2024
security
Critical Cisco bug exposes Expressway gateways to CSRF attacks
www.bleepingcomputer.com/news/security/critical-cisco-bug-exposes-expressway-gateways-to-csrf-attacks/
25 sats
\
0 comments
\
@ch0k1
8 Feb 2024
security
Web fingerprinting is worse than I thought
www.bitestring.com/posts/2023-03-19-web-fingerprinting-is-worse-than-I-thought.html
599 sats
\
15 comments
\
@shadowymartian
21 Mar 2023
bitcoin
Hackers impersonate U.S. government agencies in BEC attacks
www.bleepingcomputer.com/news/security/hackers-impersonate-us-government-agencies-in-bec-attacks/
45 sats
\
0 comments
\
@ch0k1
8 Mar 2024
security
Domain Spoofing Mutiny Wallet’s Website
www.psacramento.com/domain-spoofing-mutiny-a-web-based-bitcoin-wallet/
4926 sats
\
5 comments
\
@psacramento
15 Feb 2024
bitcoin
outlawed
Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure
cybersecuritynews.com/infostealers-to-hijack-legitimate-business-infrastructure/
10 sats
\
0 comments
\
@ch0k1
4 Jan
news
more