cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Sayswww.nytimes.com ↗Submitted 6 months ago by Davriellelouna@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 4 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 12 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 6 months ago by cm0002@lemmy.world | 0 comments
- Submitted 6 months ago by cm0002@lemmy.world | 0 comments
- I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doorsbobdahacker.com ↗Submitted 6 months ago by Pro@programming.dev | 12 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 6 months ago by Davriellelouna@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 4 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) | bobdahackerbobdahacker.com ↗Submitted 6 months ago by cm0002@piefed.world | 6 comments
- Submitted 6 months ago by Pro@programming.dev | 1 comment
- UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity riskswww.artificialintelligence-news.com ↗Submitted 6 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To Chinacitizenlab.ca ↗Submitted 6 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesresearch.kudelskisecurity.com ↗Submitted 6 months ago by cm0002@piefed.world | 2 comments
- Submitted 6 months ago by cm0002@piefed.world | 1 comment
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 6 months ago by vk6flab@lemmy.radio | 0 comments
- Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Toolscybersrcc.com ↗Submitted 6 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Google's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdotyro.slashdot.org ↗Submitted 6 months ago by cm0002@piefed.world | 1 comment
- Submitted 1 year ago by shellsharks@shellsharks.social | 0 comments
- Citizen Lab director warns about US authoritarian descent at Black Hat Security Conferencetechcrunch.com ↗Submitted 6 months ago by Davriellelouna@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 1 comment
- Submitted 6 months ago by cm0002@piefed.world | 0 comments