5 reasons why attackers are phishing over LinkedIn
(bleepingcomputer.com)
91.
92.
Dangerous runC flaws could allow hackers to escape Docker containers
(bleepingcomputer.com)
93.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
94.
How a ransomware gang encrypted Nevada government's systems
(bleepingcomputer.com)
95.
Multiple ChatGPT Security Bugs Allow Rampant Data Theft
(darkreading.com)
96.
Critical Cisco UCCX flaw lets attackers run commands as root
(bleepingcomputer.com)
97.
APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs
(darkreading.com)
98.
Critical Site Takeover Flaw Affects 400K WordPress Sites
(darkreading.com)
99.
Europe Sees Increase in Ransomware, Extortion Attacks
(darkreading.com)
100.
101.
102.
On the Road Again: Hackers Hijack Physical Cargo Freight
(darkreading.com)
103.
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
(bleepingcomputer.com)
104.
'TruffleNet' Attack Wields Stolen Credentials Against AWS
(darkreading.com)
105.
Why UUIDs won't protect your secrets
(news.ycombinator.com)
106.
107.
Why attackers are moving beyond email-based phishing attacks
(bleepingcomputer.com)
108.
109.
An attacker’s blunder gave us a look into their operations
(news.ycombinator.com)
110.
How An Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
(news.ycombinator.com)
111.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
112.
MATLAB dev says ransomware gang stole data of 10,000 people
(bleepingcomputer.com)
113.
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
(bleepingcomputer.com)
114.
Google discovered a new scam—and also fell victim to it
(arstechnica.com)
115.
How attackers are still phishing "phishing-resistant" authentication
(bleepingcomputer.com)
116.
Google spoofed via DKIM replay attack: A technical breakdown
(news.ycombinator.com)
117.
Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)
(news.ycombinator.com)
118.
Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown
(news.ycombinator.com)
119.
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
(news.ycombinator.com)
120.
Employee gets $920 for credentials used in $140 million bank heist
(bleepingcomputer.com)