cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To Chinacitizenlab.ca ↗Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 3 comments
- How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesresearch.kudelskisecurity.com ↗Submitted 3 months ago by cm0002@piefed.world | 2 comments
- Submitted 3 months ago by cm0002@piefed.world | 1 comment
- Submitted 3 months ago by vk6flab@lemmy.radio | 0 comments
- Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Toolscybersrcc.com ↗Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 year ago by IllNess@infosec.pub | 0 comments
- Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Black Friday Gets a Fakeover: Fake Stores Spike 110% by Using LLMs this Holiday Shopping Seasonwww.netcraft.com ↗Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Google's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdotyro.slashdot.org ↗Submitted 3 months ago by cm0002@piefed.world | 1 comment
- Submitted 2 years ago by sv1sjp@lemmy.world | 9 comments
- Citizen Lab director warns about US authoritarian descent at Black Hat Security Conferencetechcrunch.com ↗Submitted 3 months ago by Davriellelouna@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 5 comments
- Submitted 3 months ago by cm0002@piefed.world | 0 comments
- SoupDealer Malware Bypasses Every Sandbox, AV's and EDR/XDR in Real-World Incidentscybersecuritynews.com ↗Submitted 3 months ago by cm0002@piefed.world | 8 comments
- Submitted 3 months ago by cm0002@piefed.world | 0 comments
- Submitted 1 year ago by overflow64@lemmy.ml | 2 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 7 comments
- Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attackswww.aspistrategist.org.au ↗Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 3 months ago by tonytins@pawb.social | 1 comment
- Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 2 years ago by bulwark@infosec.pub | 8 comments
- Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessitywww.theregister.com ↗Submitted 3 months ago by cm0002@piefed.world | 3 comments
- Retailers struggle after ransomware attack on supply chain tech provider Blue Yondertherecord.media ↗Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attackswww.sentinelone.com ↗Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 7 comments
- US govt sanctioned a Russian woman for laundering virtual currency on behalf of threat actorssecurityaffairs.com ↗Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments