cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessitywww.theregister.com ↗Submitted 1 month ago by cm0002@piefed.world | 3 comments
- Submitted 1 year ago by shellsharks@shellsharks.social | 3 comments
- BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Datacybersecuritynews.com ↗Submitted 1 month ago by cm0002@piefed.world | 4 comments
- Flipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brandscybersecuritynews.com ↗Submitted 1 month ago by cm0002@lemmy.world | 27 comments
- Windows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.com ↗Submitted 1 month ago by cm0002@lemmy.world | 20 comments
- Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCONwww.microsoft.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 month ago by scytale@piefed.zip | 0 comments
- Submitted 1 month ago by Pro@programming.dev | 0 comments
- Submitted 1 month ago by ryokimball@infosec.pub | 0 comments
- Submitted 10 months ago by Branquinho@lemmy.eco.br | 0 comments
- Submitted 1 month ago by cron@feddit.org | 1 comment
- Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyatacyata.ai ↗Submitted 2 months ago by Pro@programming.dev | 0 comments
- Submitted 2 months ago by cm0002@piefed.world | 0 comments
- Submitted 2 months ago by TehBamski@lemmy.world | 0 comments
- Submitted 2 months ago by TehBamski@lemmy.world | 0 comments
- Submitted 2 months ago by cm0002@lemmy.world | 0 comments
- Submitted 2 months ago by shellsharks@infosec.pub | 0 comments
- Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistancewww.microsoft.com ↗Submitted 2 months ago by Pro@programming.dev | 2 comments
- Submitted 2 months ago by Pro@mander.xyz | 0 comments
- Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integritycispa.de ↗Submitted 2 months ago by Pro@mander.xyz | 0 comments
- Submitted 2 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 2 months ago by cm0002@lemmy.world | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Watch out, this LastPass email with "Important information about your account" is a phishwww.malwarebytes.com ↗Submitted 2 years ago by throws_lemy@lemmy.nz | 4 comments
- Internet exchange points are ignored, vulnerable, and absent from infrastructure protection planswww.theregister.com ↗Submitted 2 months ago by cm0002@lemmy.world | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 2 months ago by cm0002@lemmy.world | 2 comments
- Submitted 1 year ago by wop@infosec.pub | 2 comments
- Submitted 2 months ago by Pro@programming.dev | 1 comment
- Submitted 2 months ago by cm0002@lemmy.world | 5 comments