cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.www.proofpoint.com ↗Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 4 weeks ago by buskill@lemmy.sdf.org | 0 comments
- Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- AI’s Role in Turning Massive Data Leaks into Hacker Paydays: A Look at the Orange Breach.www.infostealers.com ↗Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 4 weeks ago by tonytins@pawb.social | 0 comments
- Submitted 4 weeks ago by otters_raft@lemmy.ca [bot] | 0 comments
- Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 4 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 months ago by Joker@sh.itjust.works | 0 comments
- Microsoft seizes 240 websites used by Egyptian phishing-as-a-service operation.blogs.microsoft.com ↗Submitted 4 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 4 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by teh_shame@infosec.pub | 3 comments
- Operation Undercut: Russian Influence Campaign Targets Western Support for Ukrainewww.recordedfuture.com ↗Submitted 4 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 4 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 4 weeks ago by shellsharks@infosec.pub | 0 comments
- Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools.blog.talosintelligence.com ↗Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 4 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 4 weeks ago by shellsharks@infosec.pub | 0 comments
- RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector.unit42.paloaltonetworks.com ↗Submitted 4 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 months ago by Joker@sh.itjust.works | 0 comments
- Black Friday Gets a Fakeover: Fake Stores Spike 110% by Using LLMs this Holiday Shopping Seasonwww.netcraft.com ↗Submitted 3 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 5 weeks ago by Tea@programming.dev | 0 comments
- Submitted 5 weeks ago by Tea@programming.dev | 0 comments
- 2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RATthehackernews.com ↗Submitted 5 weeks ago by cm0002@lemmy.world | 0 comments
- Dylan Ayrey Has a Sleepless Night Thanks to an SSH Backdoor in Eight Sleep Smart Mattress Coverswww.hackster.io ↗Submitted 5 weeks ago by cm0002@lemmy.world | 0 comments
- Selective jamming: Reconfigurable intelligent surfaces reveal new method of attacking Wi-Fi networkstechxplore.com ↗Submitted 5 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 6 months ago by wop@infosec.pub | 2 comments