cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 2 years ago by shellsharks@infosec.pub | 4 comments
- Submitted 1 year ago by cm0002@lemmy.world | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 2 years ago by sv1sjp@lemmy.world | 1 comment
- Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools.blog.talosintelligence.com ↗Submitted 1 year ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector.unit42.paloaltonetworks.com ↗Submitted 1 year ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by Tea@programming.dev | 0 comments
- Submitted 1 year ago by Tea@programming.dev | 0 comments
- 2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RATthehackernews.com ↗Submitted 1 year ago by cm0002@lemmy.world | 0 comments
- Dylan Ayrey Has a Sleepless Night Thanks to an SSH Backdoor in Eight Sleep Smart Mattress Coverswww.hackster.io ↗Submitted 1 year ago by cm0002@lemmy.world | 0 comments
- Selective jamming: Reconfigurable intelligent surfaces reveal new method of attacking Wi-Fi networkstechxplore.com ↗Submitted 1 year ago by cm0002@lemmy.world | 0 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 2 comments
- Submitted 1 year ago by mwguy@infosec.pub | 1 comment
- Submitted 1 year ago by cm0002@lemmy.world | 0 comments
- Submitted 1 year ago by biptoot@lemmy.today | 4 comments
- [Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.openai.com ↗Submitted 1 year ago by Cat@ponder.cat | 0 comments
- Submitted 1 year ago by Cat@ponder.cat | 0 comments
- Submitted 1 year ago by Cat@ponder.cat | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 6 comments
- Submitted 1 year ago by Cat@ponder.cat | 1 comment
- Submitted 2 years ago by Ultra_Unlimited@discuss.tchncs.de | 0 comments
- Submitted 1 year ago by shellsharks@infosec.pub | 0 comments
- Submitted 1 year ago by Cat@ponder.cat | 0 comments
- New Tycoon 2FA Phishing Kit Raises Cybersecurity Concerns - Source: www.infosecurity-magazine.comciso2ciso.com ↗Submitted 1 year ago by Lanky_Pomegranate530@midwest.social | 0 comments
- Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger.cloud.google.com ↗Submitted 1 year ago by Cat@ponder.cat | 0 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 2 comments
- Submitted 2 years ago by shellsharks@infosec.pub | 0 comments