cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Financially Motivated Threat Actor Leveraged Google Docs and Weebly Services to Target Telecom and Financial Sectorsblog.eclecticiq.com ↗Submitted 4 weeks ago by Joker@sh.itjust.works | 0 comments
- Submitted 4 weeks ago by Joker@sh.itjust.works | 0 comments
- Silent Push Unwraps the AIZ—Aggressive Inventory Zombies—Retail & Crypto Phishing Network Campaignwww.silentpush.com ↗Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelswww.sentinelone.com ↗Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- From PoC to Attacker Interest in Hours: Real-Time Insights into Mitel MiCollab Vulnerabilitieswww.greynoise.io ↗Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 4 weeks ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 weeks ago by Joker@sh.itjust.works | 1 comment
- Submitted 3 weeks ago by Joker@sh.itjust.works | 0 comments
- Holiday Season Cyber Threats (Part 2): Ransomware, Gift Cards, and Point-of-Sale breachesintel471.com ↗Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- China-Based Hacker Charged for Conspiring to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwidewww.justice.gov ↗Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- China’s Propaganda Expansion: Inside the Rise of International Communication Centers (ICCs)www.recordedfuture.com ↗Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 weeks ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 weeks ago by taaz@biglemmowski.win | 0 comments
- Alejandro Cáceres, the hacker who took down North Korea’s internet from his home: ‘My attack was a response to their attempt to spy on me’english.elpais.com ↗Submitted 5 months ago by andrade@infosec.pub | 10 comments
- Microsoft is a national security threat, says ex-White House cyber policy directorwww.theregister.com ↗Submitted 7 months ago by ylai@lemmy.ml | 18 comments
- Submitted 5 weeks ago by shellsharks@infosec.pub | 3 comments
- Submitted 1 week ago by shellsharks@infosec.pub | 0 comments
- Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platformblog.talosintelligence.com ↗Submitted 3 weeks ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 weeks ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- A cyber-physical digital twin approach to replicating realistic multi-stage cyberattacks on smart gridsarxiv.org ↗Submitted 1 week ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 week ago by Joker@sh.itjust.works | 0 comments