cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 4 months ago by Pro@programming.dev | 0 comments
- Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraudwww.ic3.gov ↗Submitted 4 months ago by Pro@programming.dev | 0 comments
- Authoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Studywww.swp-berlin.org ↗Submitted 5 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 5 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 5 months ago by shellsharks@infosec.pub | 4 comments
- Submitted 5 months ago by Pro@programming.dev | 0 comments
- Submitted 5 months ago by Pro@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attackwww.theregister.com ↗Submitted 5 months ago by cm0002@lemmy.world | 0 comments
- Submitted 2 years ago by conorab@lemmy.conorab.com | 3 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 11 comments
- China: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19www.article19.org ↗Submitted 5 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- China-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devicessecurityscorecard.com ↗Submitted 5 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and Morethehackernews.com ↗Submitted 5 months ago by cm0002@lemmy.world | 0 comments
- Submitted 5 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 5 months ago by Pro@programming.dev | 0 comments
- Submitted 5 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 5 months ago by cm0002@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 5 comments
- An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploitgoogleprojectzero.blogspot.com ↗Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 5 months ago by cm0002@lemmy.world | 0 comments
- The Hidden Threat: How DanaBot Malware Facilitated Data Theft and Russian State-Sponsored Spyingwww.rferl.org ↗Submitted 5 months ago by Pro@programming.dev | 0 comments
- [Crosspost from !appsec] Looking for a new training/certification. People who did OSWA (Web-200 by OffSec), how was it?www.offsec.com ↗Submitted 1 year ago by N7x@infosec.pub | 3 comments
- Submitted 5 months ago by cm0002@lemmy.world | 0 comments
- 16 billion passwords leaked in one of the biggest data breaches ever: Report - Dexertowww.dexerto.com ↗Submitted 5 months ago by cm0002@lemmy.world | 4 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwordscitizenlab.ca ↗Submitted 5 months ago by Pro@programming.dev | 0 comments