@anon
sign up
@anon
sign up
pull down to refresh
Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents
cybersecuritynews.com/17-year-old-vulnerability-word-documents/
0 sats
\
0 comments
\
@ch0k1
25 Apr
security
related
Newly discovered Linux malware specializes in stealth and Monero mining
www.bleepingcomputer.com/news/security/linux-malware-perfctl-behind-years-long-cryptomining-campaign/
266 sats
\
0 comments
\
@dontforgetthekeys
4 Oct 2024
security
Bitwarden Hack - How to Break Into Password Vaults Without Using Passwords 👀
blog.redteam-pentesting.de/2024/bitwarden-heist/
4241 sats
\
16 comments
\
@FlashYellow
4 Jan 2024
security
First ever iOS trojan stealing Face ID data to break into bank accounts
www.tomsguide.com/computing/malware-adware/first-ever-ios-trojan-discovered-and-its-stealing-face-id-data-to-break-into-bank-accounts
1546 sats
\
0 comments
\
@ch0k1
15 Feb 2024
security
How would you attack self-custody?
11.4k sats
\
38 comments
\
@TSW
20 Nov 2023
bitcoin
New BunnyLoader Malware Variant Surfaces with Modular Attack Features
thehackernews.com/2024/03/new-bunnyloader-malware-variant.html?m=1
167 sats
\
2 comments
\
@ch0k1
23 Mar 2024
security
Blockstream Jade Security Disclosure
blog.blockstream.com/jade-security-disclosure/
2076 sats
\
1 comment
\
@m0wer
17 Dec
bitcoin
Adobe Acrobat is malware
504 sats
\
15 comments
\
@SimpleStacker
19 Apr
tech
graphite phone attack surface: any web link, any app, even if not clicked.
news.ycombinator.com/item?id=45106903
545 sats
\
0 comments
\
@standardcrypto
2 Sep
security
Critical vulnerability affecting most Linux distros allows for bootkits
arstechnica.com/security/2024/02/critical-vulnerability-affecting-most-linux-distros-allows-for-bootkits/
976 sats
\
0 comments
\
@ch0k1
7 Feb 2024
security
256-bit offline and secure physical private key
www.modulo.network/key
786 sats
\
7 comments
\
@k00b
1 Mar
bitcoin
The Largest Crypto Heists of All Time
646 sats
\
2 comments
\
@suraz
11 Mar
charts_and_numbers
Over 4,000 backdoors hijacked by registering expired domains
www.bleepingcomputer.com/news/security/over-4-000-backdoors-hijacked-by-registering-expired-domains/
311 sats
\
4 comments
\
@ch0k1
11 Jan
security
Three Million Malware — Infected Smart Toothbrushes Used in Swiss DDoS Attacks
www.tomshardware.com/networking/three-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages
1939 sats
\
4 comments
\
@0xbitcoiner
6 Feb 2024
security
What is crypto malware, and how to detect it ?
cointelegraph.com/news/what-is-crypto-malware-and-how-to-detect-it
74 sats
\
0 comments
\
@0xbitcoiner
22 Dec 2023
security
Botnet 7777 Running on TPLink Routers
394 sats
\
4 comments
\
@_b_o_n_e_s_
3 Nov 2024
security
Hackers Trick Users to Install Malware Via Weaponized PDF
gbhackers.com/hackers-trick-users-to-install-malware-via-weaponized-pdf/
211 sats
\
0 comments
\
@ch0k1
17 Mar 2024
security
Thousands of Linux Systems Infected By Stealthy Malware Since 2021
arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/
150 sats
\
0 comments
\
@0xbitcoiner
4 Oct 2024
security
Found In The Wild: The World’s First Unkillable UEFI Bootkit For Linux
arstechnica.com/security/2024/11/found-in-the-wild-the-worlds-first-unkillable-uefi-bootkit-for-linux/
271 sats
\
4 comments
\
@0xbitcoiner
28 Nov 2024
security
North Korean hackers deploy ‘Durian’ malware, targeting crypto firms
cointelegraph.com/news/north-korean-hackers-deploy-durian-malware-targeting-south-korean-crypto-firms
64 sats
\
2 comments
\
@ch0k1
13 May 2024
security
New Ymir Ransomware Exploits Memory for Stealthy Attacks On Corporate Networks
thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
182 sats
\
0 comments
\
@ch0k1
12 Nov 2024
security
PSA related to the macOS Bitcoin whitepaper discovery
1096 sats
\
15 comments
\
@WeAreAllSatoshi
7 Apr 2023
bitcoin
more