cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 4 hours ago by shellsharks@infosec.pub | 2 comments
- Submitted 1 day ago by cm0002@lemmy.world | 3 comments
- Submitted 5 days ago by buskill@lemmy.sdf.org | 0 comments
- Submitted 6 days ago by boatswain@infosec.pub | 3 comments
- Submitted 1 month ago by twiked@sh.itjust.works | 0 comments
- 38C3 - We've not been trained for this: life after the Newag DRM disclosure [Stream archive; Youtube]www.youtube.com ↗Submitted 6 days ago by taaz@biglemmowski.win | 1 comment
- Submitted 1 month ago by Joker@sh.itjust.works | 1 comment
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 2 months ago by evenwicht@lemmy.sdf.org | 14 comments
- Over 600,000 Records, Including Background Checks, Vehicle, and Property Records Exposed Online by an Information Service Providerwww.websiteplanet.com ↗Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by shellsharks@infosec.pub | 1 comment
- Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCONwww.microsoft.com ↗Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by shellsharks@infosec.pub | 2 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 2 months ago by Branquinho@lemmy.eco.br | 0 comments
- Microsoft is a national security threat, says ex-White House cyber policy directorwww.theregister.com ↗Submitted 8 months ago by ylai@lemmy.ml | 18 comments
- Alejandro Cáceres, the hacker who took down North Korea’s internet from his home: ‘My attack was a response to their attempt to spy on me’english.elpais.com ↗Submitted 6 months ago by andrade@infosec.pub | 10 comments
- Microsoft seizes 240 websites used by Egyptian phishing-as-a-service operation.blogs.microsoft.com ↗Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Operation Undercut: Russian Influence Campaign Targets Western Support for Ukrainewww.recordedfuture.com ↗Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Black Friday Gets a Fakeover: Fake Stores Spike 110% by Using LLMs this Holiday Shopping Seasonwww.netcraft.com ↗Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Retailers struggle after ransomware attack on supply chain tech provider Blue Yondertherecord.media ↗Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attackswww.sentinelone.com ↗Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by shellsharks@infosec.pub | 5 comments