cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 1 year ago by shellsharks@infosec.pub | 1 comment
- Internet exchange points are ignored, vulnerable, and absent from infrastructure protection planswww.theregister.com ↗Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 3 months ago by cm0002@lemmy.world | 2 comments
- TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)www.leviathansecurity.com ↗Submitted 1 year ago by taaz@biglemmowski.win | 0 comments
- Three million malware-infected smart toothbrushes used in Swiss DDoS attacks — botnet causes millions of euros in damageswww.tomshardware.com ↗Submitted 1 year ago by oh_gosh_its_osh@lemmy.ml | 5 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 3 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 3 months ago by Pro@programming.dev | 1 comment
- Submitted 3 months ago by cm0002@lemmy.world | 5 comments
- Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitationthehackernews.com ↗Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 3 months ago by cm0002@lemmy.world | 4 comments
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Security pros are drowning in threat-intel data and it's making everything more dangerouswww.theregister.com ↗Submitted 3 months ago by cm0002@lemmy.world | 1 comment
- Pro-Russia group exploits Roundcube zero-day in attacks on European government emailswww.theregister.com ↗Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilitieswww.helpnetsecurity.com ↗Submitted 3 months ago by cm0002@lemmy.world | 1 comment
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 2 years ago by mike@postit.quantentoast.de | 10 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 3 comments
- Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 11 months ago by Joker@sh.itjust.works | 0 comments
- Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend Systemcybersecuritynews.com ↗Submitted 3 months ago by cm0002@programming.dev | 1 comment
- Submitted 11 months ago by Joker@sh.itjust.works | 1 comment
- Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- UNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwordscybersecuritynews.com ↗Submitted 3 months ago by cm0002@lemmy.world | 1 comment