Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
sh.itjust.works
186
posts in the last 30 days
Qilin
and
Warlock
Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
sh.itjust.works
·
2w
Hackers Weaponize Claude Code Leak to Spread
Vidar
and
GhostSocks
Malware
sh.itjust.works
·
2w
Disgruntled
researcher leaks “
BlueHammer
” Windows zero-day exploit
sh.itjust.works
·
2w
Microsoft links
Medusa
ransomware
affiliate
to zero-day attacks
sh.itjust.works
·
2w
Why Simple
Breach
Monitoring
is No Longer Enough
sh.itjust.works
·
2w
Hackers Using Fake "Microsoft Teams"
Domains
to Attack Users Via Malicious
Payload
sh.itjust.works
·
2w
Traffic
violation
scams switch to
QR
codes in new phishing texts
sh.itjust.works
·
2w
Hackers exploit
React2Shell
in automated
credential
theft campaign
sh.itjust.works
·
2w
A Vulnerability in
Fortinet
FortiClientEMS
Could Allow for Arbitrary Code Execution
sh.itjust.works
·
2w
House
Flipper
is free on Steam
sh.itjust.works
·
3w
Yog-Sothothery
in music form: Dark Ambient, great as a different soundtrack for games like Amnesia and Soma, or TTRPGs like Call of Cthulhu
sh.itjust.works
·
3w
The Space Games
Synthwave
Music Collection For Sci Fi games, revised, for
NoMansSky
and other games in the genre if you like having music while gaming
sh.itjust.works
·
3w
What do you think is a good
Achievement
system
logic
?
sh.itjust.works
·
3w
Can a 200 dollar laptop play games well
enough
?
sh.itjust.works
·
3w
Crypto platform
Drift
suspends services after millions stolen in security incident | The Record from
Recorded
Future News
sh.itjust.works
·
3w
Chinese Hackers Target European Governments in
Espionage
Campaigns -
Infosecurity
Magazine
sh.itjust.works
·
3w
Matrix Protocol Surveillance and
Forensic
Analysis
Suite
sh.itjust.works
·
3w
Infrsatructure
Attacks With Physical
Consequences
Down 25%
sh.itjust.works
·
3w
WhatsApp malware campaign uses
malicious
VBS
files to gain persistent access
sh.itjust.works
·
3w
Mercor
confirms security incident tied to
LiteLLM
supply chain attack | The Record from Recorded Future News
sh.itjust.works
·
3w
« Page 7
·
Page 9 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help