cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 2 weeks ago by Tea@programming.dev | 0 comments
- Submitted 2 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 weeks ago by itwasntme223@infosec.pub | 5 comments
- Submitted 3 weeks ago by itwasntme223@infosec.pub | 10 comments
- Submitted 10 months ago by coffeeClean@infosec.pub | 152 comments
- Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices.www.tarlogic.com ↗Submitted 3 weeks ago by Tea@programming.dev | 9 comments
- Submitted 3 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 3 weeks ago by cm0002@lemmy.world | 1 comment
- Hacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court ordertechcrunch.com ↗Submitted 3 weeks ago by Fitik@fedia.io | 0 comments
- Submitted 3 weeks ago by shellsharks@infosec.pub | 2 comments
- InvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationscybersecuritynews.com ↗Submitted 3 weeks ago by cm0002@lemmy.world | 0 comments
- Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCONwww.microsoft.com ↗Submitted 4 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.www.ic3.gov ↗Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- BADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected with malware that conscripts them into a botnet.www.humansecurity.com ↗Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national securitycyberscoop.com ↗Submitted 3 weeks ago by tonytins@pawb.social | 2 comments
- Submitted 3 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.securelist.com ↗Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Whistleblower Says Microsoft Dismissed Warnings About a Security Flaw That Russians Later Used to Hack U.S. Governmentwww.propublica.org ↗Submitted 9 months ago by ylai@lemmy.ml | 2 comments
- Submitted 3 weeks ago by shellsharks@infosec.pub | 2 comments
- Submitted 3 weeks ago by tonytins@pawb.social | 0 comments
- Submitted 4 months ago by Branquinho@lemmy.eco.br | 0 comments
- Submitted 3 months ago by Joker@sh.itjust.works | 0 comments
- Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.www.proofpoint.com ↗Submitted 3 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 weeks ago by buskill@lemmy.sdf.org | 0 comments