cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 5 hours ago by onlinepersona@programming.dev | 1 comment
- Submitted 11 hours ago by cm0002@lemdro.id | 0 comments
- Submitted 2 days ago by shellsharks@infosec.pub | 0 comments
- RealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbackscybersecuritynews.com ↗Submitted 2 days ago by cm0002@lemmy.zip | 1 comment
- Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Datawww.wired.com ↗Submitted 3 days ago by cm0002@lemdro.id | 0 comments
- ASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Userscybersecuritynews.com ↗Submitted 5 days ago by cm0002@lemdro.id | 2 comments
- RondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home devicewww.theregister.com ↗Submitted 6 days ago by cm0002@lemmy.zip | 6 comments
- PoC exploit Released for VMware Workstation guest-to-host escape Vulnerabilitycybersecuritynews.com ↗Submitted 1 week ago by cm0002@piefed.social | 1 comment
- Submitted 2 weeks ago by shellsharks@infosec.pub | 3 comments
- Submitted 2 weeks ago by cm0002@sh.itjust.works | 0 comments
- State-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure" as Russia, China-aligned groups representing 90% of activities, EU report showsbreached.company ↗Submitted 2 weeks ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 2 weeks ago by PhilipTheBucket@piefed.social | 2 comments
- Submitted 2 weeks ago by PhilipTheBucket@piefed.social | 1 comment
- Submitted 2 weeks ago by shellsharks@infosec.pub | 4 comments
- Submitted 2 weeks ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 2 weeks ago by cm0002@piefed.world | 1 comment
- Submitted 2 weeks ago by cm0002@piefed.world | 0 comments
- Submitted 2 weeks ago by cm0002@piefed.world | 2 comments
- Submitted 2 weeks ago by cm0002@piefed.world | 2 comments
- China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networksthehackernews.com ↗Submitted 2 weeks ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 3 weeks ago by cm0002@lemmy.world | 0 comments
- Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectorscloud.google.com ↗Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- Submitted 3 weeks ago by shellsharks@infosec.pub | 2 comments
- Submitted 3 weeks ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 3 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 weeks ago by cm0002@lemmy.world | 2 comments
- Submitted 3 weeks ago by floofloof@lemmy.ca | 3 comments
- Submitted 3 weeks ago by Occhioverde@feddit.it | 2 comments
- Submitted 3 weeks ago by Blarylark@lemmy.world | 1 comment
- Microsoft is a national security threat, says ex-White House cyber policy directorwww.theregister.com ↗Submitted 1 year ago by ylai@lemmy.ml | 18 comments