cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 1 year ago by FriedSink@thelemmy.club | 20 comments
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudwww.ic3.gov ↗Submitted 3 months ago by Pro@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 4 comments
- Microsoft won't say if its products were exploited by spyware zero-days | TechCrunchtechcrunch.com ↗Submitted 2 years ago by throws_lemy@lemmy.nz | 2 comments
- Authoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studywww.swp-berlin.org ↗Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 4 comments
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attackwww.theregister.com ↗Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)www.leviathansecurity.com ↗Submitted 1 year ago by taaz@biglemmowski.win | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 1 comment
- China: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19www.article19.org ↗Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- China-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devicessecurityscorecard.com ↗Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and Morethehackernews.com ↗Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 0 comments
- Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examplesunit42.paloaltonetworks.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 months ago by Pro@programming.dev | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Financially Motivated Threat Actor Leveraged Google Docs and Weebly Services to Target Telecom and Financial Sectorsblog.eclecticiq.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Three million malware-infected smart toothbrushes used in Swiss DDoS attacks — botnet causes millions of euros in damageswww.tomshardware.com ↗Submitted 1 year ago by oh_gosh_its_osh@lemmy.ml | 5 comments
- Submitted 2 years ago by vedard@infosec.pub | 1 comment
- Submitted 3 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 3 months ago by cm0002@lemmy.world | 0 comments