cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Selective jamming: Reconfigurable intelligent surfaces reveal new method of attacking Wi-Fi networkstechxplore.com ↗Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 2 comments
- Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by biptoot@lemmy.today | 4 comments
- [Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.openai.com ↗Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 6 comments
- Submitted 7 months ago by Cat@ponder.cat | 1 comment
- Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 1 year ago by bless@lemmy.world | 0 comments
- Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger.cloud.google.com ↗Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 7 months ago by LabPlot@floss.social | 0 comments
- Submitted 1 year ago by ylai@lemmy.ml | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 2 years ago by throws_lemy@lemmy.nz | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 6 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 5 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 3 comments
- PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacksthehackernews.com ↗Submitted 7 months ago by cm0002@lemmy.world | 0 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 0 comments
- The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.www.microsoft.com ↗Submitted 7 months ago by Cat@ponder.cat | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 6 comments
- Submitted 7 months ago by shellsharks@infosec.pub | 5 comments
- CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.www.cisa.gov ↗Submitted 7 months ago by Cat@ponder.cat | 2 comments
- Submitted 7 months ago by cm0002@lemmy.world | 1 comment