cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild - The Citizen Labcitizenlab.ca ↗Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 4 months ago by cm0002@lemmy.world | 5 comments
- Submitted 4 months ago by Rackenzik@lemmy.sdf.org | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 11 comments
- [Crosspost from !appsec] Looking for a new training/certification. People who did OSWA (Web-200 by OffSec), how was it?www.offsec.com ↗Submitted 1 year ago by N7x@infosec.pub | 3 comments
- Submitted 4 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 4 months ago by cm0002@lemmy.world | 3 comments
- Submitted 4 months ago by cm0002@lemmy.world | 0 comments
- Submitted 4 months ago by cm0002@lemmy.world | 0 comments
- Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indictedwww.justice.gov ↗Submitted 4 months ago by cm0002@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 4 comments
- Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraineweb.archive.org ↗Submitted 4 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 4 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 5 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 2 years ago by conorab@lemmy.conorab.com | 3 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platformblog.talosintelligence.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 4 months ago by shellsharks@infosec.pub | 2 comments
- Divine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australiawww.defenceconnect.com.au ↗Submitted 4 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments
- Submitted 1 year ago by MajorTom@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Future of Cybersecurity: Leadership Needed to Fully Define Quantum Threat Mitigation Strategywww.gao.gov ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments