Mrs. Y
@mrsyiswhy.bsky.social
2.4K followers
670 following
520 posts
Security Bene Gesserit and professional nerd stalker. Likes long walks in hubsites and searching for spice. Views: definitely those of my puppet overlords. Location: kernel space https://linktr.ee/chubirka
Posts
Media
Videos
Starter Packs
Reposted by Mrs. Y
Mrs. Y
@mrsyiswhy.bsky.social
· 10d
Cyber defenders sound the alarm as F5 hack exposes broad risks
A more than year-long digital intrusion into cybersecurity company F5 , publicized last week and blamed on Chinese spies, has defenders across the industry hunting for signs of compromise among the many corporate networks that use its products.
www.reuters.com
Mrs. Y
@mrsyiswhy.bsky.social
· 10d
Self-spreading GlassWorm malware hits OpenVSX, VS Code registries
A new and ongoing supply-chain attack is targeting developers on the OpenVSX and Microsoft Visual Studio marketplaces with self-spreading malware called GlassWorm that has been installed an estimated ...
www.bleepingcomputer.com
Mrs. Y
@mrsyiswhy.bsky.social
· 14d
Hackers Dox Hundreds of DHS, ICE, FBI, and DOJ Officials
Scattered LAPSUS$ Hunters—one of the latest amalgamations of typically young, reckless, and English-speaking hackers—posted the apparent phone numbers and addresses of hundreds of government officials...
www.404media.co
Mrs. Y
@mrsyiswhy.bsky.social
· 14d
Viral ‘Cheater Buster’ Sites Use Facial Recognition to Let Anyone Reveal Peoples’ Tinder Profiles
Videos demoing one of the sites have repeatedly gone viral on TikTok and other platforms recently. 404 Media verified they can locate specific peoples' Tinder profiles using their photo, and found tha...
www.404media.co
Mrs. Y
@mrsyiswhy.bsky.social
· 15d
BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices - Eclypsium | Supply Chain Security for the Modern Enterprise
Eclypsium researchers have discovered UEFI shells, authorized via Secure Boot, on Framework laptops. The UEFI shells contain capabilities that allow attackers to bypass Secure Boot on roughly 200,000 ...
eclypsium.com
Mrs. Y
@mrsyiswhy.bsky.social
· 16d
Vulnerability in confidential cloud environments uncovered
Some data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now...
techxplore.com