cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- UNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwordscybersecuritynews.com ↗Submitted 7 hours ago by cm0002@lemmy.world | 1 comment
- Submitted 1 day ago by cm0002@lemmy.world | 0 comments
- Submitted 1 day ago by cm0002@lemmy.world | 8 comments
- Submitted 1 day ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 day ago by cm0002@lemmy.world | 4 comments
- Submitted 1 day ago by Pro@programming.dev | 0 comments
- A chit-chat between Llama 2 and ChatGPT for the automated creation of exploitswww.sciencedirect.com ↗Submitted 2 days ago by Pro@programming.dev | 0 comments
- Operation Grayskull Culminates in Lengthy Sentences for Managers of Dark Web Site Dedicated to Sexual Abuse of Childrenwww.justice.gov ↗Submitted 2 days ago by Pro@programming.dev | 1 comment
- Submitted 2 days ago by Pro@programming.dev | 0 comments
- Submitted 2 days ago by Pro@programming.dev | 0 comments
- Hacker Com: Cyber Criminal Subset of The Community (Com) is a Rising Threat to Youth Onlinewww.ic3.gov ↗Submitted 2 days ago by Pro@programming.dev | 0 comments
- In Real Life (IRL) Com: Violent Subset of The Community (Com) is a Rising Threat to Youth Online(www.ic3.gov ↗Submitted 2 days ago by Pro@programming.dev | 0 comments
- ‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old companywww.hindustantimes.com ↗Submitted 3 days ago by cm0002@lemmy.world | 3 comments
- Submitted 3 days ago by Pro@programming.dev | 0 comments
- A 0-day flaw in Microsoft SharePoint is being exploited in RCE attacks on servers globally; no patch exists and tens of thousands of servers are at riskresearch.eye.security ↗Submitted 5 days ago by Pro@programming.dev | 4 comments
- Submitted 5 days ago by mhewitt@infosec.pub | 0 comments
- Submitted 1 week ago by cm0002@lemmy.world | 0 comments
- Submitted 1 week ago by Pro@programming.dev | 0 comments
- Spain: Chinese company Huawei must not be allowed access to wiretap data in 'normalisation of censorship and surveillance', rights group sayswww.article19.org ↗Submitted 1 week ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- US aims to ban Chinese technology in undersea telecommunications cables over security concernswww.reuters.com ↗Submitted 1 week ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 week ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 week ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 week ago by cm0002@lemmy.world | 0 comments
- Submitted 1 week ago by cm0002@lemmy.world | 0 comments
- Submitted 1 week ago by Pro@programming.dev | 0 comments
- Europol and Eurojust disrupt pro-Russian hacktivist group NoName057(16) that has claimed responsibility for 1,000+ DDoS attacks since 2022, and make two arrestswww.eurojust.europa.eu ↗Submitted 1 week ago by Pro@programming.dev | 0 comments
- Afghans burnt by UK data leak because someone used email to send a large sensitive dataset -- which email service, anyone know?www.theguardian.com ↗Submitted 1 week ago by evenwicht@lemmy.sdf.org | 3 comments
- A Little-Known Microsoft Program Could Expose the U.S. Defense Department to Chinese Hackerswww.propublica.org ↗Submitted 1 week ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 week ago by Pro@programming.dev | 0 comments
- Submitted 1 week ago by cm0002@programming.dev | 1 comment