Pro
@Pro@programming.dev
- Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Providerwww.cisa.gov ↗Submitted 1 day ago to cybersecurity@infosec.pub | 0 comments
- From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Deliveryresearch.checkpoint.com ↗Submitted 2 days ago to cybersecurity@infosec.pub | 0 comments
- Hong Kong invokes its national security laws to ban Taiwanese-made mobile game Reversed Front: Bonfire, marking the first known use of the laws to block a gameglobalvoices.org ↗Submitted 2 days ago to games@lemmy.world | 1 comment
- Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targetedcitizenlab.ca ↗Submitted 2 days ago to cybersecurity@infosec.pub | 0 comments
- Submitted 2 days ago to cybersecurity@infosec.pub | 1 comment
- Researchers find the first known “zero-click” attack on an AI agent; the now-fixed flaw in Microsoft 365 Copilot would let a hacker attack a user via an emailwww.aim.security ↗Submitted 3 days ago to cybersecurity@infosec.pub | 0 comments
- Submitted 3 days ago to unitedkingdom@feddit.uk | 0 comments
- Submitted 3 days ago to cybersecurity@infosec.pub | 0 comments
- Submitted 3 days ago to cybersecurity@infosec.pub | 0 comments
- Submitted 3 days ago to cybersecurity@infosec.pub | 0 comments
- Comment on Librarian Ghouls carry out attacks with data theft and crypto miner deployment 5 days ago:
Librarian Ghouls, also known as “Rare Werewolf” and “Rezet”, is an APT group that targets entities in Russia and the CIS. Other security vendors are also monitoring this APT and releasing analyses of its campaigns. The group has remained active through May 2025, consistently targeting Russian companies.
A distinctive feature of this threat is that the attackers favor using legitimate third-party software over developing their own malicious binaries. The malicious functionality of the campaign described in this article is implemented through command files and PowerShell scripts. The attackers establish remote access to the victim’s device, steal credentials, and deploy an XMRig crypto miner in the system.
Our research has uncovered new tools within this APT group’s arsenal, which we will elaborate on in this article.
- Submitted 5 days ago to cybersecurity@infosec.pub | 1 comment
- Comment on Xbox and Asus introduce the new ROG Xbox Ally and ROG Xbox Ally X gaming handhelds 5 days ago:
ASUS Republic of Gamers (ROG) is proud to announce an all-new series of Ally handhelds built from the ground up with improved ergonomics and a seamless player-first user experience.
Developed in partnership with the incredible team at Xbox, the new ROG Xbox Ally and ROG Xbox Ally X offer best-in-class ergonomics and a full-screen Xbox experience that marries the best of Xbox and PC gaming in one cohesive package.
- Submitted 5 days ago to games@lemmy.world | 14 comments
- Submitted 5 days ago to games@lemmy.world | 7 comments
- Submitted 1 week ago to technology@lemmy.zip | 17 comments
- Comment on Some people defended Ars Technica in my previous post, here is a proof about how Ars Technica parent company secretly manipulate Reddit for their own benefit. 1 week ago:
But posting like this, just to air your problems, isn’t fit.
Where exactly did I “air” my “problems”
- Comment on Some people defended Ars Technica in my previous post, here is a proof about how Ars Technica parent company secretly manipulate Reddit for their own benefit. 1 week ago:
- Comment on Some people defended Ars Technica in my previous post, here is a proof about how Ars Technica parent company secretly manipulate Reddit for their own benefit. 1 week ago:
If nothing else, this belongs in Chat, not Technology.
Nope.
Having your feelings hurt by people disagreeing with you suggests little online exposure. But you’re frankly talking about an industry you have no knowledge of.
What what you are talking about, bro.
Your comment summary is just you repeating that I know nothing about the industry.
Today the whole beehaw technology community had only 2 new posts posted in the previous 24 hours. If my post bothered you that much, I guess you reflecting on yourself on your comment.
- Comment on Some people defended Ars Technica in my previous post, here is a proof about how Ars Technica parent company secretly manipulate Reddit for their own benefit. 1 week ago:
In case it isn’t clear, the Ars Technica post is expected to hit the front page, while the ProPublica ones are expected to die, despite being the original source of the info.
- Submitted 1 week ago to technology@beehaw.org | 16 comments
- Submitted 1 week ago to cybersecurity@infosec.pub | 0 comments
- Submitted 1 week ago to cybersecurity@infosec.pub | 2 comments
- Submitted 1 week ago to cybersecurity@infosec.pub | 0 comments
- Submitted 1 week ago to cybersecurity@infosec.pub | 0 comments
- Comment on YSK: Condé Nast Parent Company is a Major Owner of Reddit, You Should Avoid their Publications (Wired, Ars Technica, GQ, The New Yorker, Vanity Fair, Vogue,...etc) as Much as Possible. 1 week ago:
My advice to people who see my post here is to spread awareness about this widely as much as they could.
They own the social media and they own the news. They are going to control people thoughts and fuck the whole journalism state if they succeeded.
- YSK: Condé Nast Parent Company is a Major Owner of Reddit, You Should Avoid their Publications (Wired, Ars Technica, GQ, The New Yorker, Vanity Fair, Vogue,...etc) as Much as Possible.en.wikipedia.org ↗Submitted 1 week ago to technology@beehaw.org | 17 comments
- International Labour Organization (ILO) : Adopt Binding Treaty to Protect ‘Gig’ Workerstext.hrw.org ↗Submitted 1 week ago to workreform@lemmy.world | 0 comments
- Submitted 1 week ago to unitedkingdom@feddit.uk | 0 comments
- Submitted 1 week ago to unitedkingdom@feddit.uk | 29 comments