cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 2 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 2 weeks ago by Pro@programming.dev | 0 comments
- CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitationthehackernews.com ↗Submitted 2 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 2 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 2 weeks ago by cm0002@lemmy.world | 4 comments
- Submitted 2 weeks ago by Pro@programming.dev | 0 comments
- Submitted 2 weeks ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Security pros are drowning in threat-intel data and it's making everything more dangerouswww.theregister.com ↗Submitted 2 weeks ago by cm0002@lemmy.world | 1 comment
- Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilitieswww.helpnetsecurity.com ↗Submitted 2 weeks ago by cm0002@lemmy.world | 1 comment
- Submitted 2 weeks ago by Pro@programming.dev | 0 comments
- Submitted 2 weeks ago by shellsharks@infosec.pub | 0 comments
- Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend Systemcybersecuritynews.com ↗Submitted 3 weeks ago by cm0002@programming.dev | 1 comment
- Submitted 3 weeks ago by cm0002@lemmy.world | 0 comments
- UNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwordscybersecuritynews.com ↗Submitted 3 weeks ago by cm0002@lemmy.world | 1 comment
- Submitted 3 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 3 weeks ago by cm0002@lemmy.world | 8 comments
- Submitted 3 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 weeks ago by cm0002@lemmy.world | 4 comments
- Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- Microsoft is a national security threat, says ex-White House cyber policy directorwww.theregister.com ↗Submitted 1 year ago by ylai@lemmy.ml | 18 comments
- A chit-chat between Llama 2 and ChatGPT for the automated creation of exploitswww.sciencedirect.com ↗Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- Operation Grayskull Culminates in Lengthy Sentences for Managers of Dark Web Site Dedicated to Sexual Abuse of Childrenwww.justice.gov ↗Submitted 3 weeks ago by Pro@programming.dev | 1 comment
- Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- Hacker Com: Cyber Criminal Subset of The Community (Com) is a Rising Threat to Youth Onlinewww.ic3.gov ↗Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- In Real Life (IRL) Com: Violent Subset of The Community (Com) is a Rising Threat to Youth Online(www.ic3.gov ↗Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- ‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old companywww.hindustantimes.com ↗Submitted 3 weeks ago by cm0002@lemmy.world | 3 comments
- Submitted 3 weeks ago by Pro@programming.dev | 0 comments
- Alejandro Cáceres, the hacker who took down North Korea’s internet from his home: ‘My attack was a response to their attempt to spy on me’english.elpais.com ↗Submitted 1 year ago by andrade@infosec.pub | 10 comments
- A 0-day flaw in Microsoft SharePoint is being exploited in RCE attacks on servers globally; no patch exists and tens of thousands of servers are at riskresearch.eye.security ↗Submitted 3 weeks ago by Pro@programming.dev | 4 comments