cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 2 weeks ago by tonytins@pawb.social | 0 comments
- Phishing campaign impersonates Booking. com, delivers a suite of credential-stealing malware.www.microsoft.com ↗Submitted 2 weeks ago by Tea@programming.dev | 0 comments
- Submitted 2 weeks ago by cm0002@lemmy.world | 1 comment
- Submitted 2 weeks ago by Tea@programming.dev | 0 comments
- Submitted 3 months ago by Joker@sh.itjust.works | 1 comment
- Submitted 3 months ago by twiked@sh.itjust.works | 0 comments
- Submitted 2 weeks ago by Tea@programming.dev | 0 comments
- Submitted 2 weeks ago by tonytins@pawb.social | 0 comments
- Submitted 2 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 2 weeks ago by Tea@programming.dev | 0 comments
- Submitted 2 weeks ago by tonytins@pawb.social | 0 comments
- Submitted 2 weeks ago by Tea@programming.dev | 0 comments
- Submitted 4 months ago by evenwicht@lemmy.sdf.org | 14 comments
- Submitted 2 weeks ago by shellsharks@infosec.pub | 1 comment
- Submitted 2 weeks ago by cm0002@lemmy.world | 1 comment
- Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attackswww.bleepingcomputer.com ↗Submitted 2 weeks ago by cm0002@lemmy.world | 0 comments
- Submitted 2 weeks ago by Soatok@pawb.social | 0 comments
- Microsoft is a national security threat, says ex-White House cyber policy directorwww.theregister.com ↗Submitted 10 months ago by ylai@lemmy.ml | 18 comments
- Submitted 2 weeks ago by aramova@infosec.pub | 8 comments
- Submitted 2 weeks ago by Tea@programming.dev | 1 comment
- Submitted 2 weeks ago by floofloof@lemmy.ca | 3 comments
- Submitted 2 weeks ago by cm0002@lemmy.world | 1 comment
- Alejandro Cáceres, the hacker who took down North Korea’s internet from his home: ‘My attack was a response to their attempt to spy on me’english.elpais.com ↗Submitted 8 months ago by andrade@infosec.pub | 10 comments
- Submitted 2 weeks ago by Tea@programming.dev | 0 comments
- Submitted 2 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 2 weeks ago by itwasntme223@infosec.pub | 5 comments
- Submitted 2 weeks ago by itwasntme223@infosec.pub | 10 comments
- Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices.www.tarlogic.com ↗Submitted 2 weeks ago by Tea@programming.dev | 9 comments
- Over 600,000 Records, Including Background Checks, Vehicle, and Property Records Exposed Online by an Information Service Providerwww.websiteplanet.com ↗Submitted 3 months ago by Joker@sh.itjust.works | 0 comments