cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 2 months ago by Linsensuppe@feddit.org | 0 comments
- Notorious Chinese hacking group Salt Typhoon found lurking in European telecom networkswww.techradar.com ↗Submitted 2 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 3 months ago by cm0002@lemmings.world | 0 comments
- Submitted 2 years ago by indepndnt@lemmy.world | 2 comments
- Submitted 1 year ago by evenwicht@lemmy.sdf.org | 0 comments
- Submitted 3 months ago by ItWasntme223@lemmy.jtworld.xyz | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 months ago by cm0002@lemmy.zip | 2 comments
- Microsoft seizes 240 websites used by Egyptian phishing-as-a-service operation.blogs.microsoft.com ↗Submitted 1 year ago by Joker@sh.itjust.works | 0 comments
- Could the XZ backdoor have been detected with better Git and Debian packaging practices?optimizedbyotto.com ↗Submitted 3 months ago by cm0002@lemmings.world | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 2 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 2 comments
- Submitted 3 months ago by onlinepersona@programming.dev | 1 comment
- Submitted 3 months ago by cm0002@lemdro.id | 0 comments
- Submitted 1 year ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by IllNess@infosec.pub | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 1 comment
- RealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbackscybersecuritynews.com ↗Submitted 3 months ago by cm0002@lemmy.zip | 1 comment
- Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Datawww.wired.com ↗Submitted 3 months ago by cm0002@lemdro.id | 0 comments
- Submitted 1 year ago by IllNess@infosec.pub | 3 comments
- Submitted 1 year ago by mwguy@infosec.pub | 0 comments
- ASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Userscybersecuritynews.com ↗Submitted 3 months ago by cm0002@lemdro.id | 2 comments
- Operation Undercut: Russian Influence Campaign Targets Western Support for Ukrainewww.recordedfuture.com ↗Submitted 1 year ago by Joker@sh.itjust.works | 0 comments
- RondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home devicewww.theregister.com ↗Submitted 3 months ago by cm0002@lemmy.zip | 6 comments
- Submitted 2 years ago by sv1sjp@lemmy.world | 9 comments
- Submitted 1 year ago by IllNess@infosec.pub | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 3 comments
- Submitted 1 year ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by overflow64@lemmy.ml | 2 comments