cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Security pros are drowning in threat-intel data and it's making everything more dangerouswww.theregister.com ↗Submitted 7 months ago by cm0002@lemmy.world | 1 comment
- Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilitieswww.helpnetsecurity.com ↗Submitted 7 months ago by cm0002@lemmy.world | 1 comment
- Submitted 7 months ago by Pro@programming.dev | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 6 comments
- Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend Systemcybersecuritynews.com ↗Submitted 7 months ago by cm0002@programming.dev | 1 comment
- Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 0 comments
- UNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwordscybersecuritynews.com ↗Submitted 7 months ago by cm0002@lemmy.world | 1 comment
- Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by cm0002@lemmy.world | 8 comments
- Submitted 2 years ago by vedard@infosec.pub | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 7 months ago by cm0002@lemmy.world | 4 comments
- Submitted 7 months ago by Pro@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 4 comments
- A chit-chat between Llama 2 and ChatGPT for the automated creation of exploitswww.sciencedirect.com ↗Submitted 7 months ago by Pro@programming.dev | 0 comments
- Operation Grayskull Culminates in Lengthy Sentences for Managers of Dark Web Site Dedicated to Sexual Abuse of Childrenwww.justice.gov ↗Submitted 7 months ago by Pro@programming.dev | 1 comment
- Submitted 7 months ago by Pro@programming.dev | 0 comments
- Submitted 7 months ago by Pro@programming.dev | 0 comments
- Hacker Com: Cyber Criminal Subset of The Community (Com) is a Rising Threat to Youth Onlinewww.ic3.gov ↗Submitted 7 months ago by Pro@programming.dev | 0 comments
- In Real Life (IRL) Com: Violent Subset of The Community (Com) is a Rising Threat to Youth Online(www.ic3.gov ↗Submitted 7 months ago by Pro@programming.dev | 0 comments
- ‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old companywww.hindustantimes.com ↗Submitted 7 months ago by cm0002@lemmy.world | 3 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 2 comments
- Submitted 7 months ago by Pro@programming.dev | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 1 comment
- Submitted 2 years ago by shellsharks@infosec.pub | 5 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 7 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 6 comments