cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Hacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court ordertechcrunch.com ↗Submitted 3 months ago by Fitik@fedia.io | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 2 comments
- InvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurationscybersecuritynews.com ↗Submitted 3 months ago by cm0002@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in imagescybersecurity.springeropen.com ↗Submitted 7 months ago by Joker@sh.itjust.works | 0 comments
- The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accesswww.volexity.com ↗Submitted 7 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 months ago by Tea@programming.dev | 0 comments
- Submitted 3 months ago by Tea@programming.dev | 0 comments
- Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.www.ic3.gov ↗Submitted 3 months ago by Tea@programming.dev | 0 comments
- Submitted 3 months ago by Tea@programming.dev | 0 comments
- Black Friday Spam Report 2024: 3 in 4 Spam Emails Are Scams, Bitdefender Antispam Lab Warnswww.bitdefender.com ↗Submitted 7 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 3 months ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 3 comments
- Submitted 11 months ago by shellsharks@infosec.pub | 2 comments
- Submitted 8 months ago by shellsharks@infosec.pub | 1 comment
- BADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected with malware that conscripts them into a botnet.www.humansecurity.com ↗Submitted 3 months ago by Tea@programming.dev | 0 comments
- Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national securitycyberscoop.com ↗Submitted 3 months ago by tonytins@pawb.social | 2 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 months ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by coffeeClean@infosec.pub | 5 comments
- Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.securelist.com ↗Submitted 3 months ago by Tea@programming.dev | 0 comments
- Submitted 3 months ago by Tea@programming.dev | 0 comments
- Submitted 3 months ago by shellsharks@infosec.pub | 2 comments
- Submitted 3 months ago by tonytins@pawb.social | 0 comments
- Submitted 1 year ago by redfox@infosec.pub | 2 comments
- Submitted 8 months ago by shellsharks@infosec.pub | 1 comment
- Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.www.proofpoint.com ↗Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 4 months ago by buskill@lemmy.sdf.org | 0 comments
- Submitted 4 months ago by Tea@programming.dev | 0 comments