#cybersecurity — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cybersecurity, aggregated by home.social.
-
Hackers are using fake job interview apps to spread new #JobStealer malware across macOS and Windows systems, stealing crypto, browser credentials, and more disguising itself as a video meeting app.
Read more: https://hackread.com/fake-job-interview-jobstealer-malware-windows-macos/
-
https://www.europesays.com/britain/36447/ UK sets out cyber resilience Bill & digital ID plans #CriticalInfrastructure #Cryptography #CyberResilience #CyberTraining #Cybersecurity #Data/Privacy #DataProtection #DigitalIdentity #DigitalTransformation #Entrust #IdentityVerification #Infosec #NationalCyberSecurityCentre(NCSC) #NationalSecurity #NCCGroup #OnlineSecurity #Risk&Compliance #RiskManagement #SupplyChain #SupplyChainSecurity #ThreatLandscape #UK #UkGovernment #UnitedKingdom #UnitedKingdom(UK)
-
Cisco cuts nearly 4,000 jobs to spend more on AI, reports ‘record quarterly revenue’
Technology giant Cisco is cutting fewer than 4,000 jobs, or around 5% of its workforce, despite reporting better-than-expected…
#NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Business #AI #ChuckRobbins #Cisco #Cybersecurity #Layoffs
https://www.newsbeep.com/us/643006/ -
Cisco cuts nearly 4,000 jobs to spend more on AI, reports ‘record quarterly revenue’
Technology giant Cisco is cutting fewer than 4,000 jobs, or around 5% of its workforce, despite reporting better-than-expected…
#NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Business #AI #ChuckRobbins #Cisco #Cybersecurity #Layoffs
https://www.newsbeep.com/us/643006/ -
New critical #Exim mailer flaw allows remote code execution
-
🚨New ransom group blog post!🚨
Group name: qilin
Post title: Schulte-Lindhorst GmbH & Co.
Info: https://cti.fyi/groups/qilin.html#ransomware #cti #threatintelligence #cybersecurity #infosec
-
🚨New ransom group blog post!🚨
Group name: qilin
Post title: Schulte-Lindhorst GmbH & Co.
Info: https://cti.fyi/groups/qilin.html#ransomware #cti #threatintelligence #cybersecurity #infosec
-
🚨New ransom group blog post!🚨
Group name: qilin
Post title: Schulte-Lindhorst GmbH & Co.
Info: https://cti.fyi/groups/qilin.html#ransomware #cti #threatintelligence #cybersecurity #infosec
-
🚨New ransom group blog post!🚨
Group name: qilin
Post title: Schulte-Lindhorst GmbH & Co.
Info: https://cti.fyi/groups/qilin.html#ransomware #cti #threatintelligence #cybersecurity #infosec
-
🚨New ransom group blog post!🚨
Group name: qilin
Post title: Schulte-Lindhorst GmbH & Co.
Info: https://cti.fyi/groups/qilin.html#ransomware #cti #threatintelligence #cybersecurity #infosec
-
#Fragnesia Made Public As Latest #Linux Local Privilege Escalation Vulnerability
-
#Fragnesia Made Public As Latest #Linux Local Privilege Escalation Vulnerability
-
#Fragnesia Made Public As Latest #Linux Local Privilege Escalation Vulnerability
-
#Fragnesia Made Public As Latest #Linux Local Privilege Escalation Vulnerability
-
#Fragnesia Made Public As Latest #Linux Local Privilege Escalation Vulnerability
-
Security Tip: Move toward a risk-based patch management strategy. 🛡️ Relying solely on CVSS scores can lead to 'vulnerability fatigue.' Instead, prioritize based on: 1. Known Exploited Vulnerabilities (KEV), 2. Exposure (is the asset internet-facing?), and 3. Business Criticality. This ensures you fix what matters most, first. Research threat intelligence and track the latest CVEs at https://cvedatabase.com #CVE #CyberSecurity #InfoSec #PatchManagement
-
A secure device is only secure if its whole life is 𝘤𝘰𝘯𝘵𝘳𝘰𝘭𝘭𝘦𝘥.
#cybersecurity #informationsecurity #iso27001 #dora #cybergovernance #digitaltransformation #legalcompliance #odit #isms
#riskmanagement #assetmanagement -
https://winbuzzer.com/2026/05/14/openais-gpt-55-matches-claude-mythos-in-security-tests-xcxwbn/
A UK AI Security Institute evaluation put GPT-5.5 near Claude Mythos on vulnerability-finding tasks.
#AI #GPT55Cyber #ClaudeMythos #UKAISecurityInstitute #OpenAI #Anthropic #Claude #AIBenchmarks #SecurityResearch #Cybersecurity
-
Grok-Hack: Morsecode-Tweet räumt KI-Wallet leer https://tarnkappe.info/artikel/grok-hack-morsecode-tweet-ki-wallet-329054.html #bot #cybersecurity #infosec
-
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
#Windows #BitLocker zero-day gives access to protected drives, PoC released
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure
The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI
-
📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure
The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI
-
📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure
The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI
-
📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure
The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI
-
📰 Novel 'GemStuffer' Campaign Abuses RubyGems Repository as Data Exfiltration Channel
A novel campaign 'GemStuffer' is abusing the RubyGems registry as a data exfiltration channel. 💎 Attackers published 150+ gems to scrape and store UK gov data, not to infect users. #SupplyChain #CyberSecurity #RubyGems #InfoSec
-
Patch Tuesday, May 2026 Edition – Krebs on Security https://krebsonsecurity.com/2026/05/patch-tuesday-may-2026-edition/ #bot #cybersecurity #infosec
-
🛡️ #Cybersecurity news & tips across the #fediverse
“# EFF # CANADA 🇨🇦: # BillC22 (2026), a # surveillance nightmare # tech https://www. eff.org/deeplinks/2026/05/cana das-bill-c-22-repackaged-version-last-years-surveillance-nightmare”
https://toot.community/@MusiqueNow/116569261698486962
🤖 via RSS feed. Not an endorsement.
-
🍵 HTB Support Walkthrough 🍵
Learn how to perform:
- LDAP Enumeration
- .NET Reverse Engineering
- Bloodhound Enumeration
- Resource Based Constraint Delegation🎬️Watch it here:
https://www.youtube.com/watch?v=VIgskjoELo0#HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF
-
🍵 HTB Support Walkthrough 🍵
Learn how to perform:
- LDAP Enumeration
- .NET Reverse Engineering
- Bloodhound Enumeration
- Resource Based Constraint Delegation🎬️Watch it here:
https://www.youtube.com/watch?v=VIgskjoELo0#HTB #HackTheBox #OSCP #Pentesting #EthicalHacking #Cybersecurity #RedTeam #CTF
-
Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅
Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇
https://juncotic.com/copyfail-vulnerabilidad-del-sistema-criptografico-de-linux/
#gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic