cybersecurity - cybersecurity@infosec.pub
- https://infosec.pub/c/cybersecurity
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome! Enjoy!About
Community Rules
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Mar 23:08
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Mar 23:08
comments (0)
Experts doubt Oracle's breach denial as inside data emerges
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Mar 22:43
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Mar 22:43
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Mar 15:34
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Mar 15:34
comments (0)
Steam pulls game demo infecting Windows with info-stealing malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Mar 04:30
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Mar 04:30
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Mar 13:37
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Mar 13:37
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Mar 14:33
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Mar 14:33
comments (2)
New Arcane stealer spreading via YouTube and Discord.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 19 Mar 11:34
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 19 Mar 11:34
comments (0)
New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Mar 03:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Mar 03:58
comments (1)
New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support
(hackread.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 06:34
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 06:34
comments (1)
Critical RCE flaw in Apache Tomcat actively exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Mar 05:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Mar 05:12
comments (0)
Infamous ransomware hackers reveal new tool to brute-force VPNs
(www.techradar.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 02:40
comments (3)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 02:40
comments (3)
New MassJacker clipper targets pirated software seekers
(web.archive.org)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 23:43
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 23:43
comments (1)
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption.
(tinyhack.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 23:05
comments (7)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 23:05
comments (7)
Warning over free online file converters that actually install malware.
(www.fbi.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 23:02
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 23:02
comments (1)
mac.c macOS Stealer
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 17 Mar 22:47
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 17 Mar 22:47
comments (0)
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 20:23
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 20:23
comments (0)
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 18:15
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 18:15
comments (0)
Denmark warns of increased state-sponsored campaigns targeting the European telcos
(web.archive.org)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 16:43
comments (2)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 16:43
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Mar 14:15
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Mar 14:15
comments (1)
The ransomware clones of HellCat & Morpheus.
(thecyberwire.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 23:28
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 23:28
comments (0)
[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.
(www.bentasker.co.uk)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 19:47
comments (4)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 19:47
comments (4)
Thousands of healthcare records exposed online, including private patient information
(www.techradar.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 19:44
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 19:44
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 05:02
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 05:02
comments (0)
CISA: We didn't fire red teams, just unhired some of them
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 23:45
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 23:45
comments (2)
Ransomware Hits Record High: 126% Surge in Attacks in February 2025
(hackread.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 23:24
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 23:24
comments (0)
FreeType Zero-Day Being Exploited in the Wild
(www.securityweek.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 20:50
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 20:50
comments (0)
Windows 10 KB5053606 update fixes broken SSH connections
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 18:18
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 18:18
comments (0)
Phishing campaign impersonates Booking. com, delivers a suite of credential-stealing malware.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 17:39
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 17:39
comments (0)
New Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcams
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 15:07
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 15:07
comments (1)
DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware.
(www.tenable.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 15:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 15:05
comments (0)
Head Mare and Twelve: Joint attacks on Russian entities.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 11:19
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 11:19
comments (0)
Lazarus Group deceives developers with 6 new malicious npm packages
(cyberscoop.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 01:42
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 01:42
comments (0)
Chinese snoops spotted on end-of-life Juniper routers
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 19:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 19:09
comments (0)
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers.
(cloud.google.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 18:48
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 18:48
comments (0)
Mozilla warns users to update Firefox before certificate expires
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 18:45
comments (8)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 18:45
comments (8)
Medusa Ransomware.
(www.cisa.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 18:34
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 18:34
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 13:47
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 13:47
comments (1)
North Korean Lazarus hackers infect hundreds via npm packages
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 06:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 06:58
comments (1)
Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 06:44
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 06:44
comments (0)
On The Insecurity of Telecom Stacks in the Wake of Salt Typhoon - Dhole Moments
(soatok.blog)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 05:55
comments (0)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 05:55
comments (0)
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
(techcrunch.com)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 22:24
comments (8)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 22:24
comments (8)
'Uber for nurses' exposes 86k+ medical records, PII.
(www.theregister.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 18:59
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 18:59
comments (1)
Google researchers uncover critical security flaw in all AMD Zen processors
(www.techspot.com)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 05:05
comments (3)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 05:05
comments (3)
The ESP32 Bluetooth Backdoor That Wasn’t
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 23:53
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 23:53
comments (1)
SideWinder targets the maritime and nuclear sectors with an updated toolset.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 17:30
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 17:30
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 17:17
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 17:17
comments (0)
Snopes Twitter got hacked. Twitter screws up the response
(infosec.exchange)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 02:57
comments (10)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 02:57
comments (10)
How to Set Up Your Online Identity on Keyoxide: A Simple Guide
(blog.epic-worlds.com)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 02:29
comments (10)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 02:29
comments (10)
Undocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.
(www.tarlogic.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 22:06
comments (9)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 22:06
comments (9)
YouTubers extorted via copyright strikes to spread malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 19:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 19:37
comments (0)
Undocumented backdoor found in Bluetooth chip used by a billion devices
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 18:25
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 18:25
comments (1)
Hacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court order
(techcrunch.com)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 22:54
comments (0)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 22:54
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Mar 15:24
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Mar 15:24
comments (2)
InvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurations
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Mar 07:46
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Mar 07:46
comments (0)
Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.
(hunt.io)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 20:35
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 20:35
comments (0)
Malvertising campaign leads to info stealers hosted on GitHub.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 19:11
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 19:11
comments (0)
Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.
(www.ic3.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 16:10
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 16:10
comments (0)
Unmasking the new persistent attacks on Japan.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 12:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 12:18
comments (0)
Stealers and backdoors are spreading under the guise of a DeepSeek client.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 11:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 11:18
comments (0)
BADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected(backdoored) with malware that conscripts them into a botnet.
(www.humansecurity.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 17:32
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 17:32
comments (0)
Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security
(cyberscoop.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 16:58
comments (2)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 16:58
comments (2)
Scrolls - A "Newsletter" with some Cybersecurity stuff
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 16:29
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 16:29
comments (0)
I spoke to a task scammer. Here's how it went.
(www.malwarebytes.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 16:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 16:05
comments (0)
Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 12:46
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 12:46
comments (0)
Silk Typhoon targeting IT supply chain.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 12:45
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 12:45
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 06:44
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 06:44
comments (2)
Ransomware crew threatens to leak 'stolen' Tata Tech data
(www.theregister.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 05:30
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 05:30
comments (0)
Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.
(www.proofpoint.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 18:39
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 18:39
comments (0)
Techlore video review of BusKill (Open-Source Dead Man Switch) 🔒
(www.buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 04 Mar 18:29
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 04 Mar 18:29
comments (0)
Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit.
(icode4.coffee)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 16:10
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 16:10
comments (0)
AI’s Role in Turning Massive Data Leaks into Hacker Paydays: A Look at the Orange Breach.
(www.infostealers.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 13:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 13:18
comments (0)
Ransomware scum abusing Microsoft Windows-signed driver
(www.theregister.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 04 Mar 08:52
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 04 Mar 08:52
comments (0)
Plane GPS systems are under sustained attack - is the solution a new atomic clock?
(www.bbc.com)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 03 Mar 23:00
comments (0)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 03 Mar 23:00
comments (0)
Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions.
(cloud.google.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 16:38
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 16:38
comments (0)
Uncovering .NET Malware Obfuscated by Encryption and Virtualization.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 13:19
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 13:19
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Mar 13:18
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Mar 13:18
comments (0)
The mobile threat landscape in 2024.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 12:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 12:05
comments (0)
This Week In Security: Malicious Themes, Crypto Heists, And Wallbleed
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Feb 18:04
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Feb 18:04
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Feb 12:35
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Feb 12:35
comments (0)
Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 27 Feb 13:51
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 27 Feb 13:51
comments (0)
Cross-platform, multilingual Russian operations promote pro-Kremlin content.
(dfrlab.org)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 23:43
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 23:43
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Feb 17:50
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Feb 17:50
comments (0)
RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 14:43
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 14:43
comments (0)
Auto-Color: An Emerging and Evasive Linux Backdoor.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 21:44
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 21:44
comments (0)
Your item has sold! Avoiding scams targeting online sellers.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 21:40
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 21:40
comments (0)
2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 18:42
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 18:42
comments (0)
Dylan Ayrey Has a Sleepless Night Thanks to an SSH Backdoor in Eight Sleep Smart Mattress Covers
(www.hackster.io)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 18:03
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 18:03
comments (0)
Selective jamming: Reconfigurable intelligent surfaces reveal new method of attacking Wi-Fi networks
(techxplore.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 17:44
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 17:44
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Feb 15:51
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Feb 15:51
comments (2)
Raymond IT Systems Hit by Cyber Attack – Investigation In progress
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Feb 2025 18:21
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Feb 2025 18:21
comments (0)
quantitative analysis tools
in cybersecurity@infosec.pub from biptoot@lemmy.today on 21 Feb 2025 21:58
comments (4)
in cybersecurity@infosec.pub from biptoot@lemmy.today on 21 Feb 2025 21:58
comments (4)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Feb 2025 06:27
comments (6)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Feb 2025 06:27
comments (6)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Feb 2025 20:55
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Feb 2025 20:55
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Feb 2025 06:40
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Feb 2025 06:40
comments (0)
How to visualize #server #metrics in #RealTime via #TCP in #LabPlot?
@labplot@lemmy.kde.social @sysadmin@lemmy.world@sysadmin@lemmy.ml
in cybersecurity@infosec.pub from LabPlot@floss.social on 18 Feb 2025 09:15
comments (0)
in cybersecurity@infosec.pub from LabPlot@floss.social on 18 Feb 2025 09:15
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Feb 2025 14:55
comments (5)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Feb 2025 14:55
comments (5)
Violet Blue: America’s unfolding cybersecurity catastrophe
(medium.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Feb 2025 05:20
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Feb 2025 05:20
comments (3)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Feb 2025 14:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Feb 2025 14:36
comments (0)
Hackers spoof Microsoft ADFS login pages to steal credentials
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Feb 2025 09:36
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Feb 2025 09:36
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Feb 2025 14:37
comments (8)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Feb 2025 14:37
comments (8)
Researcher sniffs out three-year Go supply chain attack
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Feb 2025 22:48
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Feb 2025 22:48
comments (1)
Musk’s DOGE Minions Refuse to Reveal Their Names When Grilling Civil Servants
(infosec.pub)
in cybersecurity@infosec.pub from mwguy@infosec.exchange on 04 Feb 2025 22:08
comments (0)
in cybersecurity@infosec.pub from mwguy@infosec.exchange on 04 Feb 2025 22:08
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Jan 2025 14:00
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Jan 2025 14:00
comments (2)
Google takes action to counter G.co phishing abuse
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 Jan 2025 19:29
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 Jan 2025 19:29
comments (0)
RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jan 2025 05:03
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jan 2025 05:03
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Jan 2025 13:30
comments (7)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Jan 2025 13:30
comments (7)
Investigating USB-to-Ethernet Dongles With “Malware” Claims
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jan 2025 22:35
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jan 2025 22:35
comments (3)
BusKill (Dead Man Switch) Warrant Canary for 2025 H1
(buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 14 Jan 2025 20:19
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 14 Jan 2025 20:19
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Jan 2025 17:34
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Jan 2025 17:34
comments (2)
New HHS nondiscrimination guidelines on AI use in Healthcare
in cybersecurity@infosec.pub from boatswain@infosec.pub on 13 Jan 2025 22:53
comments (3)
in cybersecurity@infosec.pub from boatswain@infosec.pub on 13 Jan 2025 22:53
comments (3)
38C3 - We've not been trained for this: life after the Newag DRM disclosure [Stream archive; Youtube]
(www.youtube.com)
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 13 Jan 2025 20:47
comments (1)
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 13 Jan 2025 20:47
comments (1)
New Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detection
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jan 2025 16:02
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jan 2025 16:02
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Jan 2025 13:57
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Jan 2025 13:57
comments (1)
Stratoshark: Wireshark for the cloud - now available! - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 24 Jan 2025 00:24
comments (1)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 24 Jan 2025 00:24
comments (1)
Asus lets processor security fix slip out early, AMD confirms patch in progress
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 19:27
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 19:27
comments (0)
Supply chain attack strikes array of Chrome Extensions
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 05:08
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 05:08
comments (3)
MasterCard DNS Error Went Unnoticed for Years
(krebsonsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 22:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 22:07
comments (0)
Microsoft research finds Microsoft AI products may never be secure
(pivot-to-ai.com)
in cybersecurity@infosec.pub from MajorHavoc@programming.dev on 22 Jan 2025 18:57
comments (2)
in cybersecurity@infosec.pub from MajorHavoc@programming.dev on 22 Jan 2025 18:57
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Jan 2025 15:02
comments (5)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Jan 2025 15:02
comments (5)
Pumakit – A Sophisticated Linux Rootkit Attack Critical Infrastructure
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 07:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 07:37
comments (0)
Botnet Unleashes Record-Breaking 5.6Tbps DDoS Attack
(www.pcmag.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jan 2025 22:42
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jan 2025 22:42
comments (0)
SpyLoan: A Global Threat Exploiting Social Engineering
(www.mcafee.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 01 Dec 2024 06:32
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 01 Dec 2024 06:32
comments (0)
From a Regular Infostealer to its Obfuscated Version
(isc.sans.edu)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 30 Nov 2024 09:58
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 30 Nov 2024 09:58
comments (0)
Lab401 black friday / cyber monday sale with hamster hunt
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 29 Nov 2024 22:27
comments (0)
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 29 Nov 2024 22:27
comments (0)
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
(arxiv.org)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 20:40
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 20:40
comments (0)
Tor in Russia: A call for more WebTunnel bridges
(blog.torproject.org)
in cybersecurity@infosec.pub from twiked@sh.itjust.works on 28 Nov 2024 20:27
comments (0)
in cybersecurity@infosec.pub from twiked@sh.itjust.works on 28 Nov 2024 20:27
comments (0)
Over 600,000 Records, Including Background Checks, Vehicle, and Property Records Exposed Online by an Information Service Provider
(www.websiteplanet.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 18:39
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 18:39
comments (0)
Malicious NPM Package Exploits React Native Documentation Example
(checkmarx.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 18:07
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 18:07
comments (0)
Beluga phishing campaign targets OneDrive credentials
(www.threatdown.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 14:02
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 14:02
comments (0)
Integer Overflow vulnerability - Windows operating system.
(ssd-disclosure.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 07:49
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 28 Nov 2024 07:49
comments (0)
What is with bad password requirements
in cybersecurity@infosec.pub from NullNet@lemmy.blahaj.zone on 28 Nov 2024 07:47
comments (24)
in cybersecurity@infosec.pub from NullNet@lemmy.blahaj.zone on 28 Nov 2024 07:47
comments (24)
BusKill Dead Man Switch now available in a brick-and-mortar in The Netherlands 🧱🛡️
(www.buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.kde.social on 27 Nov 2024 19:26
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.kde.social on 27 Nov 2024 19:26
comments (0)
Black Friday Gets a Fakeover: Fake Stores Spike 110% by Using LLMs this Holiday Shopping Season
(www.netcraft.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 18:41
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 18:41
comments (0)
Gaming Engines: An Undetected Playground for Malware Loaders
(research.checkpoint.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 15:53
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 15:53
comments (0)
Bootkitty: Analyzing the first UEFI bootkit for Linux
(www.welivesecurity.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 15:11
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 15:11
comments (0)
PSLoramyra: Technical Analysis of Fileless Malware Loader
(any.run)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 12:27
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 27 Nov 2024 12:27
comments (0)
Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)
(www.trustwave.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 20:17
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 20:17
comments (0)
CERT-In Alert: Multiple Vulnerabilities In Android Impacting Millions Of Devices
(cyble.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 16:23
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 16:23
comments (0)
Operation Undercut: Russian Influence Campaign Targets Western Support for Ukraine
(www.recordedfuture.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 16:18
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 16:18
comments (0)
Advanced Cyberthreats Targeting Holiday Shoppers
(www.fortinet.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 15:11
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 15:11
comments (0)
BitLocker Security: Are Your Keys Truly Safe?
(blog.nviso.eu)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 13:40
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 13:40
comments (0)
Apple Web Content Filter Bypass
(cxsecurity.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 13:36
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 13:36
comments (0)
RomCom exploits Firefox and Windows zero days in the wild
(www.welivesecurity.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 12:39
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 12:39
comments (1)
Customizable Elpaco ransomware abuses the Everything library
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 11:37
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 11:37
comments (0)
Retailers struggle after ransomware attack on supply chain tech provider Blue Yonder
(therecord.media)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 09:31
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 26 Nov 2024 09:31
comments (0)
Bigger and badder: how DDoS attack sizes have evolved over the last decade
(blog.cloudflare.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 19:39
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 19:39
comments (0)
South Asian hackers target Pakistani entities in new espionage campaign
(therecord.media)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 18:42
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 18:42
comments (0)
Notorious Ursnif Banking Trojan Uses Stealthy Memory Execution To Avoid Detection
(cyble.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 17:36
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 17:36
comments (1)
Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platform
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 14:37
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 14:37
comments (0)
Perfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and Proxyjacking
(socradar.io)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 14:36
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 14:36
comments (1)
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
(www.trendmicro.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 12:46
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 12:46
comments (0)
CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks
(www.sentinelone.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 12:28
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 12:28
comments (0)
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
(www.microsoft.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 07:54
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 25 Nov 2024 07:54
comments (0)
Major cybercrime crackdowns signal shift in global cybersecurity strategies
(theconversation.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 24 Nov 2024 17:14
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 24 Nov 2024 17:14
comments (0)
Andrew Tate's The Real World breached.
(ddosecrets.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Nov 2024 09:30
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Nov 2024 09:30
comments (0)
KC Man Indicted for Computer Hacking
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 21:29
comments (3)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 21:29
comments (3)
Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images
(cybersecurity.springeropen.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 20:31
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 20:31
comments (0)
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
(www.volexity.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 20:03
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 20:03
comments (0)
Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 12:55
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 12:55
comments (0)
Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY
(www.recordedfuture.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 01:24
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Nov 2024 01:24
comments (0)
Microsoft seizes 240 websites used by Egyptian phishing-as-a-service operation.
(blogs.microsoft.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 23:48
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 23:48
comments (1)
2024 CWE Top 25 Most Dangerous Software Weaknesses
(cwe.mitre.org)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 19:31
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 19:31
comments (0)
Financially Motivated Threat Actor Leveraged Google Docs and Weebly Services to Target Telecom and Financial Sectors
(blog.eclecticiq.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 17:14
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 17:14
comments (0)
Justice Department Seizes Cybercrime Website and Charges Its Administrators
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 17:13
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 17:13
comments (0)
Black Friday Spam Report 2024: 3 in 4 Spam Emails Are Scams, Bitdefender Antispam Lab Warns
(www.bitdefender.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 16:22
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 16:22
comments (0)
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
(www.welivesecurity.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 16:12
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 16:12
comments (0)
Future of Cybersecurity: Leadership Needed to Fully Define Quantum Threat Mitigation Strategy
(www.gao.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 15:11
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 15:11
comments (0)
The Philippine army is recruiting young tech civilians to fight cyber attacks
(restofworld.org)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 12:21
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 12:21
comments (0)
DPRK IT Workers | A Network of Active Front Companies and Their Links to China
(www.sentinelone.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 12:19
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 21 Nov 2024 12:19
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Nov 2024 14:08
comments (7)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Nov 2024 14:08
comments (7)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Nov 2024 15:25
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Nov 2024 15:25
comments (2)
Security Update - Release 1.32.5 · dani-garcia/vaultwarden
(github.com)
in cybersecurity@infosec.pub from Branquinho@lemmy.eco.br on 18 Nov 2024 14:25
comments (1)
in cybersecurity@infosec.pub from Branquinho@lemmy.eco.br on 18 Nov 2024 14:25
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Nov 2024 14:36
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Nov 2024 14:36
comments (3)
Release 1.32.4 · dani-garcia/vaultwarden
(github.com)
in cybersecurity@infosec.pub from Branquinho@lemmy.eco.br on 11 Nov 2024 16:26
comments (0)
in cybersecurity@infosec.pub from Branquinho@lemmy.eco.br on 11 Nov 2024 16:26
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Nov 2024 17:21
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Nov 2024 17:21
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Nov 2024 16:13
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Nov 2024 16:13
comments (0)
(PDF neutering) Not all PDFs are documents; some are apps! Insurance company sent me a form to sign as a PDF with ~~JavaScript~~ Java. Is it a tracker?
in cybersecurity@infosec.pub from evenwicht@lemmy.sdf.org on 04 Nov 2024 10:50
comments (0)
in cybersecurity@infosec.pub from evenwicht@lemmy.sdf.org on 04 Nov 2024 10:50
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 01 Nov 2024 15:45
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 01 Nov 2024 15:45
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Oct 2024 18:01
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Oct 2024 18:01
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Oct 2024 16:11
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Oct 2024 16:11
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Oct 2024 15:53
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Oct 2024 15:53
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Oct 2024 14:51
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Oct 2024 14:51
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Oct 2024 14:07
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Oct 2024 14:07
comments (4)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Oct 2024 14:40
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Oct 2024 14:40
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Oct 2024 16:01
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Oct 2024 16:01
comments (1)
fetchmail logs showing a Tor exit node is compromised
in cybersecurity@infosec.pub from evenwicht@lemmy.sdf.org on 08 Oct 2024 10:37
comments (0)
in cybersecurity@infosec.pub from evenwicht@lemmy.sdf.org on 08 Oct 2024 10:37
comments (0)
Function of each type of computer virus
(chat-to.dev)
in cybersecurity@infosec.pub from gafanhoto@leminal.space on 07 Oct 2024 14:54
comments (1)
in cybersecurity@infosec.pub from gafanhoto@leminal.space on 07 Oct 2024 14:54
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Oct 2024 14:53
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Oct 2024 14:53
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Oct 2024 15:11
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Oct 2024 15:11
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Oct 2024 14:40
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Oct 2024 14:40
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Sep 2024 16:33
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Sep 2024 16:33
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Sep 2024 14:14
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Sep 2024 14:14
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Sep 2024 15:07
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Sep 2024 15:07
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Sep 2024 15:32
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Sep 2024 15:32
comments (0)
How to manage and document decisions
in cybersecurity@infosec.pub from wop@infosec.pub on 21 Sep 2024 14:24
comments (2)
in cybersecurity@infosec.pub from wop@infosec.pub on 21 Sep 2024 14:24
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Sep 2024 14:12
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Sep 2024 14:12
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Sep 2024 16:25
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Sep 2024 16:25
comments (4)
data was exfiltrated from a corp I did not even know had my data; then they offer to have a privacy abuser (Cloudflare) MitM credit monitoring txns. WTF?
in cybersecurity@infosec.pub from soloActivist@links.hackliberty.org on 12 Sep 2024 17:56
comments (2)
in cybersecurity@infosec.pub from soloActivist@links.hackliberty.org on 12 Sep 2024 17:56
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Aug 2024 15:41
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Aug 2024 15:41
comments (4)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Aug 2024 15:10
comments (7)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Aug 2024 15:10
comments (7)