cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 1 year ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 6 months ago by joulethief@discuss.tchncs.de | 9 comments
- Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentialssecuritylabs.datadoghq.com ↗Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 1 comment
- Submitted 6 months ago by Joker@sh.itjust.works | 1 comment
- Google Advertising Out to Lunch? Simple Pivots Catch an Ongoing Malvertising Campaign Hiding in Plain Sightwww.silentpush.com ↗Submitted 6 months ago by Joker@sh.itjust.works | 1 comment
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by boredsquirrel@slrpnk.net | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 2 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Unauthorized access to iCloud: analyzing an iOS vulnerability that could expose sensitive data to attackerswww.jamf.com ↗Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Japanese publisher Kadokawa paid $3 million to Russia-linked hacker group after cyberattackmainichi.jp ↗Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprisewww.microsoft.com ↗Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by redfox@infosec.pub | 3 comments
- StripedFly worming miner hides sophisticated code and espionage-ready capabilitiesusa.kaspersky.com ↗Submitted 1 year ago by throws_lemy@lemmy.nz | 0 comments
- Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukrainewww.microsoft.com ↗Submitted 6 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 6 months ago by Joker@sh.itjust.works | 0 comments