cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- A cyber-physical digital twin approach to replicating realistic multi-stage cyberattacks on smart gridsarxiv.org ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Analysing the cultural dimensions of cybercriminal groups -- A case study on the Conti ransomware grouparxiv.org ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- CVE-2024-55563: Transaction-Relay Jamming Vulnerability Poses Threat to Bitcoin Lightning Networkariard.github.io ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- OpenWrt Affected By Security Issue That Could Have Led To Compromised Build Artifactswww.phoronix.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- ‘Massive breach’: Social security numbers, health info and much more stolen in Hoboken cyberattackwww.nj.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 2 comments
- Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asiawww.cyfirma.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 1 year ago by ylai@lemmy.ml | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 6 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windowswww.cadosecurity.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Network Abuses Leveraging High-Profile Events: Suspicious Domain Registrations and Other Scamsunit42.paloaltonetworks.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 1 comment
- Action against ‘phone phishing’ gang in Belgium and the Netherlands: eight arrestswww.eurojust.europa.eu ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by shellsharks@infosec.pub | 2 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 2 years ago by solidsnail@infosec.pub | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Where There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0daylabs.watchtowr.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attackswww.trendmicro.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 1 comment
- Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnelswww.sentinelone.com ↗Submitted 10 months ago by Joker@sh.itjust.works | 0 comments
- Submitted 10 months ago by Joker@sh.itjust.works | 0 comments