cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- AI’s Role in Turning Massive Data Leaks into Hacker Paydays: A Look at the Orange Breach.www.infostealers.com ↗Submitted 4 months ago by Tea@programming.dev | 0 comments
- BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild - The Citizen Labcitizenlab.ca ↗Submitted 1 year ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 4 months ago by tonytins@pawb.social | 0 comments
- Submitted 4 months ago by otters_raft@lemmy.ca [bot] | 0 comments
- Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 4 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 4 comments
- Submitted 1 year ago by redfox@infosec.pub | 4 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by conorab@lemmy.conorab.com | 3 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Submitted 9 months ago by shellsharks@infosec.pub | 2 comments
- Submitted 4 months ago by cm0002@lemmy.world | 0 comments
- Submitted 4 months ago by shellsharks@infosec.pub | 0 comments
- An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploitgoogleprojectzero.blogspot.com ↗Submitted 1 year ago by throws_lemy@lemmy.nz | 0 comments
- Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools.blog.talosintelligence.com ↗Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 4 months ago by shellsharks@infosec.pub | 0 comments
- RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector.unit42.paloaltonetworks.com ↗Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 2 comments
- Submitted 4 months ago by Tea@programming.dev | 0 comments
- Submitted 4 months ago by Tea@programming.dev | 0 comments
- 2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RATthehackernews.com ↗Submitted 4 months ago by cm0002@lemmy.world | 0 comments
- Dylan Ayrey Has a Sleepless Night Thanks to an SSH Backdoor in Eight Sleep Smart Mattress Coverswww.hackster.io ↗Submitted 4 months ago by cm0002@lemmy.world | 0 comments
- Selective jamming: Reconfigurable intelligent surfaces reveal new method of attacking Wi-Fi networkstechxplore.com ↗Submitted 4 months ago by cm0002@lemmy.world | 0 comments
- Submitted 1 year ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 4 months ago by shellsharks@infosec.pub | 2 comments