cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- SoupDealer Malware Bypasses Every Sandbox, AV's and EDR/XDR in Real-World Incidentscybersecuritynews.com ↗Submitted 15 hours ago by cm0002@piefed.world | 8 comments
- Submitted 1 day ago by cm0002@piefed.world | 0 comments
- Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attackswww.aspistrategist.org.au ↗Submitted 3 days ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 3 days ago by tonytins@pawb.social | 1 comment
- Submitted 4 days ago by cm0002@lemmy.world | 0 comments
- Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessitywww.theregister.com ↗Submitted 4 days ago by cm0002@piefed.world | 3 comments
- BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Datacybersecuritynews.com ↗Submitted 6 days ago by cm0002@piefed.world | 4 comments
- Flipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brandscybersecuritynews.com ↗Submitted 1 week ago by cm0002@lemmy.world | 27 comments
- Windows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.com ↗Submitted 1 week ago by cm0002@lemmy.world | 20 comments
- Submitted 1 week ago by scytale@piefed.zip | 0 comments
- Submitted 1 week ago by Pro@programming.dev | 0 comments
- Submitted 1 week ago by ryokimball@infosec.pub | 0 comments
- Submitted 1 week ago by cron@feddit.org | 1 comment
- Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyatacyata.ai ↗Submitted 1 week ago by Pro@programming.dev | 0 comments
- Submitted 1 week ago by cm0002@piefed.world | 0 comments
- Submitted 1 week ago by TehBamski@lemmy.world | 0 comments
- Submitted 1 week ago by TehBamski@lemmy.world | 0 comments
- Submitted 1 week ago by cm0002@lemmy.world | 0 comments
- Submitted 1 week ago by shellsharks@infosec.pub | 0 comments
- Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistancewww.microsoft.com ↗Submitted 1 week ago by Pro@programming.dev | 2 comments
- Submitted 1 week ago by Pro@mander.xyz | 0 comments
- Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integritycispa.de ↗Submitted 1 week ago by Pro@mander.xyz | 0 comments
- Submitted 1 week ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 week ago by cm0002@lemmy.world | 0 comments
- Internet exchange points are ignored, vulnerable, and absent from infrastructure protection planswww.theregister.com ↗Submitted 1 week ago by cm0002@lemmy.world | 0 comments
- Submitted 1 week ago by cm0002@lemmy.world | 2 comments
- Submitted 2 weeks ago by Pro@programming.dev | 1 comment
- Submitted 2 weeks ago by cm0002@lemmy.world | 5 comments
- Submitted 2 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 2 weeks ago by Pro@programming.dev | 0 comments