Innerworld@lemmy.worldEnglish · 2 days agoFrance's health ministry has confirmed a data breach involving the exposure of administrative information for 15.8 million patients and sensitive doctors' notes for approximately 165,000 individualsplus-squarewww.france24.comexternal-linkmessage-square1linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkFrance's health ministry has confirmed a data breach involving the exposure of administrative information for 15.8 million patients and sensitive doctors' notes for approximately 165,000 individualsplus-squarewww.france24.comInnerworld@lemmy.worldEnglish · 2 days agomessage-square1linkfedilink
Innerworld@lemmy.worldEnglish · 4 days agoHacktivist group “Department of Peace” claims to have breached a DHS tech‑procurement office, leaking ICE contract records involving over 6,000 vendors, including major defense and surveillance firmsplus-squaretechcrunch.comexternal-linkmessage-square3linkfedilinkarrow-up158arrow-down10
arrow-up158arrow-down1external-linkHacktivist group “Department of Peace” claims to have breached a DHS tech‑procurement office, leaking ICE contract records involving over 6,000 vendors, including major defense and surveillance firmsplus-squaretechcrunch.comInnerworld@lemmy.worldEnglish · 4 days agomessage-square3linkfedilink
Innerworld@lemmy.worldEnglish · 2 days agoA ransomware attack on August 31, 2025, compromised the data of 1.2 million at the University of Hawaiʻi Cancer Center, targeting research servers but sparing clinical operationsplus-squarewww.securityweek.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkA ransomware attack on August 31, 2025, compromised the data of 1.2 million at the University of Hawaiʻi Cancer Center, targeting research servers but sparing clinical operationsplus-squarewww.securityweek.comInnerworld@lemmy.worldEnglish · 2 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 2 days agoMicrosoft, working with Europol, authorities from 6 countries, and 11 security organizations, disrupted the Tycoon 2FA phishing-as-a-service platform on seizing 330 domainsplus-squarewww.microsoft.comexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkMicrosoft, working with Europol, authorities from 6 countries, and 11 security organizations, disrupted the Tycoon 2FA phishing-as-a-service platform on seizing 330 domainsplus-squarewww.microsoft.comInnerworld@lemmy.worldEnglish · 2 days agomessage-square1linkfedilink
Innerworld@lemmy.worldEnglish · 3 days agoOnline ads surpassed email as the primary malware channel in 2025, accounting for 60%+ of all observed malware and phishing campaignsplus-squarewww.businessinsider.comexternal-linkmessage-square1linkfedilinkarrow-up123arrow-down10
arrow-up123arrow-down1external-linkOnline ads surpassed email as the primary malware channel in 2025, accounting for 60%+ of all observed malware and phishing campaignsplus-squarewww.businessinsider.comInnerworld@lemmy.worldEnglish · 3 days agomessage-square1linkfedilink
Innerworld@lemmy.worldEnglish · 3 days agoAuthorities from 14 countries shut down LeakBase, seize its domains, and arrest multiple people allegedly tied to the cybercrime forum, which had 142K+ membersplus-squarecyberscoop.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkAuthorities from 14 countries shut down LeakBase, seize its domains, and arrest multiple people allegedly tied to the cybercrime forum, which had 142K+ membersplus-squarecyberscoop.comInnerworld@lemmy.worldEnglish · 3 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 4 days agoA Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminalsplus-squarewww.wired.comexternal-linkmessage-square2linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkA Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminalsplus-squarewww.wired.comInnerworld@lemmy.worldEnglish · 4 days agomessage-square2linkfedilink
Innerworld@lemmy.worldEnglish · 5 days agoGoogle quantum-proofs HTTPS by squeezing 15kB of data into 700-byte spaceplus-squarearstechnica.comexternal-linkmessage-square5linkfedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkGoogle quantum-proofs HTTPS by squeezing 15kB of data into 700-byte spaceplus-squarearstechnica.comInnerworld@lemmy.worldEnglish · 5 days agomessage-square5linkfedilink
codeinabox@programming.devEnglish · 5 days agoGeekery: Bookending the COROS Security Debacle of 2025plus-squarewww.dcrainmaker.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkGeekery: Bookending the COROS Security Debacle of 2025plus-squarewww.dcrainmaker.comcodeinabox@programming.devEnglish · 5 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 6 days agoIsrael hacked BadeSaba, a popular Iranian prayer app with 5M+ installs on Google Play, to send messages urging Iranian military personnel to defectplus-squarewww.wsj.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkIsrael hacked BadeSaba, a popular Iranian prayer app with 5M+ installs on Google Play, to send messages urging Iranian military personnel to defectplus-squarewww.wsj.comInnerworld@lemmy.worldEnglish · 6 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 10 days agoGoogle disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theftplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkGoogle disrupts Chinese-linked group UNC2814, which breached 53+ organizations across 42 countries and utilized Google Sheets to manage targeting and data theftplus-squarewww.reuters.comInnerworld@lemmy.worldEnglish · 10 days agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 10 days agoUnknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026plus-squarewww.bloomberg.comexternal-linkmessage-square1linkfedilinkarrow-up133arrow-down11
arrow-up132arrow-down1external-linkUnknown hacker used Claude to steal 150GB of Mexican government data, including 195M taxpayer records, in December 2025 and January 2026plus-squarewww.bloomberg.comInnerworld@lemmy.worldEnglish · 10 days agomessage-square1linkfedilink
Innerworld@lemmy.worldEnglish · 19 days agoAll US Social Security numbers may need to be changed following a massive breach that is already being investigated as a national threatplus-squarewww.ecoticias.comexternal-linkmessage-square6linkfedilinkarrow-up135arrow-down12
arrow-up133arrow-down1external-linkAll US Social Security numbers may need to be changed following a massive breach that is already being investigated as a national threatplus-squarewww.ecoticias.comInnerworld@lemmy.worldEnglish · 19 days agomessage-square6linkfedilink
codeinabox@programming.devEnglish · 25 days agoBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comexternal-linkmessage-square4linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comcodeinabox@programming.devEnglish · 25 days agomessage-square4linkfedilink
codeinabox@programming.devEnglish · 25 days agoHope Is Not a Security Strategy: Why Secure-by-Default Beats Hardeningplus-squaretuananh.netexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkHope Is Not a Security Strategy: Why Secure-by-Default Beats Hardeningplus-squaretuananh.netcodeinabox@programming.devEnglish · 25 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 25 days agoLocal tools should still use vaultsplus-squarepierce.devexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkLocal tools should still use vaultsplus-squarepierce.devcodeinabox@programming.devEnglish · 25 days agomessage-square0linkfedilink
codeinabox@programming.devEnglish · 30 days agoHow recruitment fraud turned cloud IAM into a $2 billion attack surfaceplus-squareventurebeat.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkHow recruitment fraud turned cloud IAM into a $2 billion attack surfaceplus-squareventurebeat.comcodeinabox@programming.devEnglish · 30 days agomessage-square1linkfedilink
codeinabox@programming.devEnglish · 1 month agoFrom magic to malware: How OpenClaw's agent skills become an attack surfaceplus-square1password.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkFrom magic to malware: How OpenClaw's agent skills become an attack surfaceplus-square1password.comcodeinabox@programming.devEnglish · 1 month agomessage-square0linkfedilink
Innerworld@lemmy.worldEnglish · 1 month agoCloudflare says it mitigated a 31.4 Tbps DDoS attack from the Aisuru/Kimwolf botnet in December 2025, making it the largest attack ever disclosed publiclyplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkCloudflare says it mitigated a 31.4 Tbps DDoS attack from the Aisuru/Kimwolf botnet in December 2025, making it the largest attack ever disclosed publiclyplus-squarewww.bleepingcomputer.comInnerworld@lemmy.worldEnglish · 1 month agomessage-square0linkfedilink
Maximuse@programming.devEnglish · 1 month agoECDSA Encryptionplus-squarecertera.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkECDSA Encryptionplus-squarecertera.comMaximuse@programming.devEnglish · 1 month agomessage-square0linkfedilink