cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.www.ic3.gov ↗Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 6 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- BADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected with malware that conscripts them into a botnet.www.humansecurity.com ↗Submitted 8 months ago by Tea@programming.dev | 0 comments
- Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national securitycyberscoop.com ↗Submitted 8 months ago by tonytins@pawb.social | 2 comments
- Submitted 8 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.securelist.com ↗Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by shellsharks@infosec.pub | 2 comments
- Submitted 8 months ago by tonytins@pawb.social | 0 comments
- Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.www.proofpoint.com ↗Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by buskill@lemmy.sdf.org | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- AI’s Role in Turning Massive Data Leaks into Hacker Paydays: A Look at the Orange Breach.www.infostealers.com ↗Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by tonytins@pawb.social | 0 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 4 comments
- Submitted 8 months ago by otters_raft@lemmy.ca [bot] | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by shellsharks@infosec.pub | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 9 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 8 comments
- Submitted 8 months ago by cm0002@lemmy.world | 0 comments
- Submitted 8 months ago by shellsharks@infosec.pub | 0 comments
- Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools.blog.talosintelligence.com ↗Submitted 8 months ago by Tea@programming.dev | 0 comments
- Submitted 8 months ago by Tea@programming.dev | 0 comments