TuxBotMBEnglish · 1 hour agoBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkBetting on Bots: Investigating Linux malware, crypto mining, and gambling API abuseplus-squarewww.elastic.coTuxBotMBEnglish · 1 hour agomessage-square0fedilink
TuxBotMBEnglish · 51 minutes agoStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkStaying a Step Ahead: Mitigating the DPRK IT Worker Threatplus-squarecloud.google.comTuxBotMBEnglish · 51 minutes agomessage-square0fedilink
TuxBotMBEnglish · 3 hours agoPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkPokémon video game developer confirms its systems were breached by hackersplus-squaretherecord.mediaTuxBotMBEnglish · 3 hours agomessage-square0fedilink
TuxBotMBEnglish · 2 hours agoMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft Releases October 2024 Security Updatesplus-squarewww.cisa.govTuxBotMBEnglish · 2 hours agomessage-square0fedilink
TuxBotMBEnglish · 18 minutes agoFile hosting services misused for identity phishingplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkFile hosting services misused for identity phishingplus-squarewww.microsoft.comTuxBotMBEnglish · 18 minutes agomessage-square0fedilink
TuxBotMBEnglish · 4 hours agoFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comexternal-linkmessage-square1fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkFBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulationplus-squarethehackernews.comTuxBotMBEnglish · 4 hours agomessage-square1fedilink
TuxBotMBEnglish · 2 hours agoCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCisco investigates breach after stolen data for sale on hacking forumplus-squarewww.bleepingcomputer.comTuxBotMBEnglish · 2 hours agomessage-square0fedilink
TuxBotMBEnglish · 2 hours agoNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNo Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionplus-squareunit42.paloaltonetworks.comTuxBotMBEnglish · 2 hours agomessage-square0fedilink
TuxBotMBEnglish · 6 hours agoCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coexternal-linkmessage-square1fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCups Overflow: When your printer spills more than Inkplus-squarewww.elastic.coTuxBotMBEnglish · 6 hours agomessage-square1fedilink
TuxBotMBEnglish · 3 hours agoFinding a needle in a haystack: Machine learning at the forefront of threat hunting researchplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkFinding a needle in a haystack: Machine learning at the forefront of threat hunting researchplus-squaresecurelist.comTuxBotMBEnglish · 3 hours agomessage-square0fedilink
TuxBotMBEnglish · 7 hours agoCISA Adds Three Known Exploited Vulnerabilities to Catalogplus-squarewww.cisa.govexternal-linkmessage-square1fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCISA Adds Three Known Exploited Vulnerabilities to Catalogplus-squarewww.cisa.govTuxBotMBEnglish · 7 hours agomessage-square1fedilink
TuxBotMBEnglish · 4 hours agoGameVN - 1,369,485 breached accountsplus-squarehaveibeenpwned.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkGameVN - 1,369,485 breached accountsplus-squarehaveibeenpwned.comTuxBotMBEnglish · 4 hours agomessage-square0fedilink
TuxBotMBEnglish · 3 hours agoA Single Cloud Compromise Can Feed an Army of AI Sex Botsplus-squarekrebsonsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Single Cloud Compromise Can Feed an Army of AI Sex Botsplus-squarekrebsonsecurity.comTuxBotMBEnglish · 3 hours agomessage-square0fedilink
TuxBotMBEnglish · 4 hours agoCyble Sensors Uncover Cyberattacks Targeting Key Vulnerabilitiesplus-squarethecyberexpress.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCyble Sensors Uncover Cyberattacks Targeting Key Vulnerabilitiesplus-squarethecyberexpress.comTuxBotMBEnglish · 4 hours agomessage-square0fedilink
TuxBotMBEnglish · 5 hours agoHTML Smuggling: How Blob URLs are Abused to Deliver Phishing Contentplus-squarewww.trustwave.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkHTML Smuggling: How Blob URLs are Abused to Deliver Phishing Contentplus-squarewww.trustwave.comTuxBotMBEnglish · 5 hours agomessage-square0fedilink
TuxBotMBEnglish · 5 hours agoTIDRONE Targets Military and Satellite Industries in Taiwanplus-squarewww.trendmicro.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkTIDRONE Targets Military and Satellite Industries in Taiwanplus-squarewww.trendmicro.comTuxBotMBEnglish · 5 hours agomessage-square0fedilink
TuxBotMBEnglish · 4 hours agoCVE-2024-43481 Power BI Report Server Spoofing Vulnerabilityplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCVE-2024-43481 Power BI Report Server Spoofing Vulnerabilityplus-squaremsrc.microsoft.comTuxBotMBEnglish · 4 hours agomessage-square0fedilink
TuxBotMBEnglish · 6 hours agoCyber Signals Issue 8 | Education under siege: How cybercriminals target our schoolsplus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCyber Signals Issue 8 | Education under siege: How cybercriminals target our schoolsplus-squarewww.microsoft.comTuxBotMBEnglish · 6 hours agomessage-square0fedilink
TuxBotMBEnglish · 8 hours agoContagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malwareplus-squareunit42.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkContagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malwareplus-squareunit42.paloaltonetworks.comTuxBotMBEnglish · 8 hours agomessage-square0fedilink
TuxBotMBEnglish · 6 hours agoLummaC2: Obfuscation Through Indirect Control Flowplus-squarecloud.google.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkLummaC2: Obfuscation Through Indirect Control Flowplus-squarecloud.google.comTuxBotMBEnglish · 6 hours agomessage-square0fedilink