cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 2 years ago by throws_lemy@lemmy.nz | 1 comment
- Submitted 7 months ago by TehBamski@lemmy.world | 0 comments
- Submitted 7 months ago by TehBamski@lemmy.world | 0 comments
- Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 0 comments
- Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistancewww.microsoft.com ↗Submitted 7 months ago by Pro@programming.dev | 2 comments
- Building secure applications: Key insights on authentication and authorization from Cerbos and Microsoft Entra | Cerboswww.cerbos.dev ↗Submitted 1 year ago by rohitghumare@infosec.pub | 0 comments
- Submitted 7 months ago by Pro@mander.xyz | 0 comments
- Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integritycispa.de ↗Submitted 7 months ago by Pro@mander.xyz | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 1 comment
- Submitted 7 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 5 comments
- Internet exchange points are ignored, vulnerable, and absent from infrastructure protection planswww.theregister.com ↗Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by cm0002@lemmy.world | 2 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 1 comment
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 7 comments
- Submitted 7 months ago by Pro@programming.dev | 1 comment
- Submitted 2 years ago by shellsharks@infosec.pub | 2 comments
- Submitted 7 months ago by cm0002@lemmy.world | 5 comments
- Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 7 months ago by Pro@programming.dev | 0 comments
- CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitationthehackernews.com ↗Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by cm0002@lemmy.world | 4 comments
- Submitted 7 months ago by Pro@programming.dev | 0 comments
- Submitted 7 months ago by Hotznplotzn@lemmy.sdf.org | 0 comments