cybersecurity
@cybersecurity@infosec.pub
This is a remote community, information on this page may be incomplete. View at Source ↗
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
- Submitted 2 days ago by shellsharks@infosec.pub | 7 comments
- Submitted 5 days ago by shellsharks@infosec.pub | 7 comments
- Submitted 5 days ago by shellsharks@infosec.pub | 4 comments
- Submitted 1 week ago by shellsharks@infosec.pub | 7 comments
- Submitted 1 week ago by buskill@lemmy.kde.social | 0 comments
- TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak (CVE-2024-3661)www.leviathansecurity.com ↗Submitted 1 week ago by taaz@biglemmowski.win | 0 comments
- Submitted 1 week ago by teh_shame@infosec.pub | 3 comments
- Microsoft is a national security threat, says ex-White House cyber policy directorwww.theregister.com ↗Submitted 1 week ago by ylai@lemmy.ml | 18 comments
- Submitted 1 week ago by shellsharks@infosec.pub | 4 comments
- Submitted 1 week ago by maegul@lemmy.ml | 20 comments
- Submitted 1 week ago by Danterious@lemmy.dbzer0.com | 1 comment
- Submitted 2 weeks ago by shellsharks@infosec.pub | 4 comments
- Submitted 2 weeks ago by coffeeClean@infosec.pub | 149 comments
- Submitted 2 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 2 weeks ago by shellsharks@infosec.pub | 18 comments
- Submitted 2 weeks ago by redfox@infosec.pub | 1 comment
- Submitted 3 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 3 weeks ago by FriedSink@thelemmy.club | 20 comments
- Submitted 4 weeks ago by shellsharks@infosec.pub | 3 comments
- Submitted 4 weeks ago by shellsharks@infosec.pub | 0 comments
- Submitted 4 weeks ago by coffeeClean@infosec.pub | 5 comments
- Submitted 4 weeks ago by redfox@infosec.pub | 3 comments
- Submitted 4 weeks ago by redfox@infosec.pub | 2 comments
- Submitted 5 weeks ago by shellsharks@infosec.pub | 7 comments
- Submitted 5 weeks ago by shellsharks@infosec.pub | 3 comments
- Submitted 5 weeks ago by redfox@infosec.pub | 8 comments
- Submitted 5 weeks ago by Jman100@infosec.pub | 1 comment
- Building secure applications: Key insights on authentication and authorization from Cerbos and Microsoft Entra | Cerboswww.cerbos.dev ↗Submitted 5 weeks ago by rohitghumare@infosec.pub | 0 comments
- Submitted 1 month ago by shellsharks@infosec.pub | 2 comments
- AI bots hallucinate software packages and devs download them - even if potentially poisoned with malwarewww.theregister.com ↗Submitted 1 month ago by mozz@mbin.grits.dev | 0 comments