WebRTC and Onion Routing Question
in cybersecurity@infosec.pub from xoron@programming.dev on 29 Nov 09:34
comments (0)
in cybersecurity@infosec.pub from xoron@programming.dev on 29 Nov 09:34
comments (0)
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?
(pvs-studio.com)
in cybersecurity@infosec.pub from CodiUnicorn@programming.dev on 27 Nov 08:55
comments (0)
in cybersecurity@infosec.pub from CodiUnicorn@programming.dev on 27 Nov 08:55
comments (0)
oh no, not npm again...
(www.youtube.com)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 26 Nov 19:55
comments (0)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 26 Nov 19:55
comments (0)
Cato CTRL™ Threat Research: HashJack - Novel Indirect Prompt Injection Against AI Browser Assistants
(www.catonetworks.com)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 26 Nov 12:43
comments (0)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 26 Nov 12:43
comments (0)
How Quickly Can AI Crack Your Password?
(messente.com)
in cybersecurity@infosec.pub from cm0002@libretechni.ca on 25 Nov 16:33
comments (3)
in cybersecurity@infosec.pub from cm0002@libretechni.ca on 25 Nov 16:33
comments (3)
Hackers Replace 'm' with 'rn' in Microsoft(.)com to Steal Users' Login Credentials
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@suppo.fi on 25 Nov 04:55
comments (34)
in cybersecurity@infosec.pub from cm0002@suppo.fi on 25 Nov 04:55
comments (34)
Years-old bugs in open source took out major clouds at risk • The Register
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@suppo.fi on 25 Nov 04:50
comments (0)
in cybersecurity@infosec.pub from cm0002@suppo.fi on 25 Nov 04:50
comments (0)
3.5 Billion Accounts: Complete WhatsApp Directory Retrieved and Evaluated
(www.heise.de)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 20 Nov 16:00
comments (4)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 20 Nov 16:00
comments (4)
Moving Beyond the NPM elliptic Package
(soatok.blog)
in cybersecurity@infosec.pub from Soatok@pawb.social on 20 Nov 02:23
comments (0)
in cybersecurity@infosec.pub from Soatok@pawb.social on 20 Nov 02:23
comments (0)
Researchers discover security vulnerability in WhatsApp— Worldwide enumeration of accounts was possible due to a —now closed— privacy vulnerability
(www.univie.ac.at)
in cybersecurity@infosec.pub from Mod@reddthat.com on 19 Nov 21:37
comments (1)
in cybersecurity@infosec.pub from Mod@reddthat.com on 19 Nov 21:37
comments (1)
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
(www.wired.com)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 19 Nov 19:30
comments (0)
in cybersecurity@infosec.pub from cm0002@digipres.cafe on 19 Nov 19:30
comments (0)
We Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)
(www.youtube.com)
in cybersecurity@infosec.pub from Kissaki@programming.dev on 18 Nov 17:58
comments (1)
in cybersecurity@infosec.pub from Kissaki@programming.dev on 18 Nov 17:58
comments (1)
SilentButDeadly – Network Communication Blocker Tool That Neutralizes EDR/AV
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@libretechni.ca on 17 Nov 07:17
comments (0)
in cybersecurity@infosec.pub from cm0002@libretechni.ca on 17 Nov 07:17
comments (0)
German Chancellor Merz: "Will not allow components from China in 6G network"
(www.heise.de)
in cybersecurity@infosec.pub from Sepia@mander.xyz on 16 Nov 12:25
comments (2)
in cybersecurity@infosec.pub from Sepia@mander.xyz on 16 Nov 12:25
comments (2)
Vulnerability-Lookup 2.18.0 - Integration with Rulezet
in cybersecurity@infosec.pub from cm0002@no.lastname.nz on 14 Nov 16:12
comments (0)
in cybersecurity@infosec.pub from cm0002@no.lastname.nz on 14 Nov 16:12
comments (0)
Privilege Escalation from lightdm Service User to root in KAuth Helper Service (CVE-2025-62876)
(security.opensuse.org)
in cybersecurity@infosec.pub from cm0002@suppo.fi on 13 Nov 23:11
comments (0)
in cybersecurity@infosec.pub from cm0002@suppo.fi on 13 Nov 23:11
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Nov 17:48
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Nov 17:48
comments (2)
EU Eyes Huawei and ZTE Ban in Mobile Networks of Member Countries
(www.bloomberg.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Nov 05:21
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Nov 05:21
comments (0)
EU's cybersecurity agency reports surge in cyberattacks against public administrations across Europe
(industrialcyber.co)
in cybersecurity@infosec.pub from Penguin@lemmy.kde.social on 10 Nov 18:08
comments (1)
in cybersecurity@infosec.pub from Penguin@lemmy.kde.social on 10 Nov 18:08
comments (1)
Today I learned: binfmt_misc - dfir.ch - shadow suid
(dfir.ch)
in cybersecurity@infosec.pub from Kissaki@programming.dev on 10 Nov 09:47
comments (0)
in cybersecurity@infosec.pub from Kissaki@programming.dev on 10 Nov 09:47
comments (0)
Meta is earning a fortune on a deluge of fraudulent ads, documents show
(www.reuters.com)
in cybersecurity@infosec.pub from cm0002@europe.pub on 08 Nov 22:45
comments (3)
in cybersecurity@infosec.pub from cm0002@europe.pub on 08 Nov 22:45
comments (3)
Cybersecurity: Russian attacks surge in Ukraine and Europe, Chinese groups target Latin American governments, report says
(www.eset.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 08 Nov 12:25
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 08 Nov 12:25
comments (0)
The Great Firewall: Massive data leak reveals the inner workings of China's censorship regime
(dti.domaintools.com)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 06 Nov 15:42
comments (0)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 06 Nov 15:42
comments (0)
The limits of zero-knowledge for age-verification | Brave
(brave.com)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 05 Nov 22:30
comments (3)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 05 Nov 22:30
comments (3)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Nov 14:51
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Nov 14:51
comments (1)
How to check if Tor Onion Service is alive?
in cybersecurity@infosec.pub from maltfield@lemmy.vg on 04 Nov 18:57
comments (1)
in cybersecurity@infosec.pub from maltfield@lemmy.vg on 04 Nov 18:57
comments (1)
China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
(thehackernews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Nov 06:12
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Nov 06:12
comments (0)
Study concludes cybersecurity training doesn’t work
(www.kpbs.org)
in cybersecurity@infosec.pub from cm0002@infosec.pub on 02 Nov 03:22
comments (50)
in cybersecurity@infosec.pub from cm0002@infosec.pub on 02 Nov 03:22
comments (50)
Russia finally bites the cybercrooks it raised, arresting suspected Meduza infostealer devs
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@quokk.au on 31 Oct 18:21
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@quokk.au on 31 Oct 18:21
comments (0)
NPM flooded with malicious packages downloaded more than 86,000 times
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@infosec.pub on 31 Oct 15:24
comments (0)
in cybersecurity@infosec.pub from cm0002@infosec.pub on 31 Oct 15:24
comments (0)
Someone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Details
(www.404media.co)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 31 Oct 00:11
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 31 Oct 00:11
comments (3)
Making A Virtual Machine Look Like Real Hardware To Malware | Hackaday
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 30 Oct 2025 09:19
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 30 Oct 2025 09:19
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 29 Oct 2025 16:49
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 29 Oct 2025 16:49
comments (2)
Making A Virtual Machine Look Like Real Hardware To Malware
(hackaday.com)
in cybersecurity@infosec.pub from IcedRaktajino@startrek.website on 28 Oct 2025 16:11
comments (0)
in cybersecurity@infosec.pub from IcedRaktajino@startrek.website on 28 Oct 2025 16:11
comments (0)
Multi-Protocol Cascading Round-Robin Cipher
in cybersecurity@infosec.pub from xoron@programming.dev on 28 Oct 2025 13:37
comments (0)
in cybersecurity@infosec.pub from xoron@programming.dev on 28 Oct 2025 13:37
comments (0)
Gmail Passwords Confirmed As Part Of 183 Million Account Data Leak
(www.forbes.com)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 27 Oct 2025 22:09
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 27 Oct 2025 22:09
comments (6)
One wrong letter: UN moves to curb cybercrime with new convention | UN News
(news.un.org)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 26 Oct 2025 01:16
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 26 Oct 2025 01:16
comments (2)
TIL that PortSwigger is a joke
in cybersecurity@infosec.pub from Deebster@infosec.pub on 24 Oct 2025 05:30
comments (2)
in cybersecurity@infosec.pub from Deebster@infosec.pub on 24 Oct 2025 05:30
comments (2)
Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica
(arstechnica.com)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 23 Oct 2025 20:00
comments (0)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 23 Oct 2025 20:00
comments (0)
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
(www.koi.ai)
in cybersecurity@infosec.pub from Linsensuppe@feddit.org on 22 Oct 2025 11:34
comments (0)
in cybersecurity@infosec.pub from Linsensuppe@feddit.org on 22 Oct 2025 11:34
comments (0)
Notorious Chinese hacking group Salt Typhoon found lurking in European telecom networks
(www.techradar.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 21 Oct 2025 18:23
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 21 Oct 2025 18:23
comments (0)
How I Almost Got Hacked By A 'Job Interview'
(blog.daviddodda.com)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 21 Oct 2025 07:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 21 Oct 2025 07:47
comments (0)
Amazon outage breaks much of the internet | TechCrunch
(techcrunch.com)
in cybersecurity@infosec.pub from ItWasntme223@lemmy.jtworld.xyz on 20 Oct 2025 19:55
comments (0)
in cybersecurity@infosec.pub from ItWasntme223@lemmy.jtworld.xyz on 20 Oct 2025 19:55
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Oct 2025 15:09
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Oct 2025 15:09
comments (0)
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 20 Oct 2025 05:16
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 20 Oct 2025 05:16
comments (2)
Could the XZ backdoor have been detected with better Git and Debian packaging practices?
(optimizedbyotto.com)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 19 Oct 2025 20:05
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmings.world on 19 Oct 2025 20:05
comments (0)
Whatever happened to Secure Quick Reliable Login (SQRL)?
in cybersecurity@infosec.pub from onlinepersona@programming.dev on 17 Oct 2025 21:40
comments (1)
in cybersecurity@infosec.pub from onlinepersona@programming.dev on 17 Oct 2025 21:40
comments (1)
MS Digital Defense Report
(cdn-dynmedia-1.microsoft.com)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 17 Oct 2025 16:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 17 Oct 2025 16:13
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 15 Oct 2025 17:43
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 15 Oct 2025 17:43
comments (1)
RealBlindingEDR Tool That Permanently Turns Off AV/EDR Using Kernel Callbacks
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 15 Oct 2025 05:40
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 15 Oct 2025 05:40
comments (1)
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
(www.wired.com)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 14 Oct 2025 19:21
comments (0)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 14 Oct 2025 19:21
comments (0)
ASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Users
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 12 Oct 2025 17:53
comments (2)
in cybersecurity@infosec.pub from cm0002@lemdro.id on 12 Oct 2025 17:53
comments (2)
RondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home device
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 11 Oct 2025 06:10
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmy.zip on 11 Oct 2025 06:10
comments (6)
Suspected Chinese cyber spies targeted Serbian aviation agency
(therecord.media)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 07 Oct 2025 09:40
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 07 Oct 2025 09:40
comments (0)
Chinese hackers exploiting VMware zero-day since October 2024
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 Oct 2025 07:40
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 Oct 2025 07:40
comments (0)
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.social on 04 Oct 2025 05:07
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.social on 04 Oct 2025 05:07
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Oct 2025 18:55
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Oct 2025 18:55
comments (3)
Vulnerability Report - September 2025
in cybersecurity@infosec.pub from cm0002@sh.itjust.works on 03 Oct 2025 16:16
comments (0)
in cybersecurity@infosec.pub from cm0002@sh.itjust.works on 03 Oct 2025 16:16
comments (0)
Japan: Brewer Asahi suspends domestic operations after cyberattack disrupts ordering and shipping
(industrialcyber.co)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 2025 14:52
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 2025 14:52
comments (0)
Attacks on critical infrastructure, espionage, IP theft, malign influence, transnational repression: China's cyber attacks "second to none", represent biggest cyber threat to Canada, report warns
(www.cyber.gc.ca)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 2025 13:46
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 03 Oct 2025 13:46
comments (0)
State-aligned cyber attacks "a strategic threat to European Union's public institutions and critical infrastructure"
(breached.company)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Oct 2025 10:19
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Oct 2025 10:19
comments (0)
US gov shutdown leaves IT projects hanging, security defenders a skeleton crew
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 02 Oct 2025 00:44
comments (2)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 02 Oct 2025 00:44
comments (2)
'Delightful' Red Hat OpenShift AI bug allows full takeover
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 02 Oct 2025 00:05
comments (1)
in cybersecurity@infosec.pub from PhilipTheBucket@piefed.social on 02 Oct 2025 00:05
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 01 Oct 2025 19:16
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 01 Oct 2025 19:16
comments (4)
Chinese hacking group ‘Phantom Taurus’ targets governments
(www.telecomstechnews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Oct 2025 08:03
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Oct 2025 08:03
comments (0)
50K Cisco firewalls remain vulnerable to advanced attacks
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 20:55
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 20:55
comments (1)
CISA kills agreement with nonprofit that runs MS-ISAC
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 20:52
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 20:52
comments (0)
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 05:12
comments (7)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 05:12
comments (7)
Tile exploit could let stalkers follow you with your own tracker — Bluetooth broadcasting flaw is relatively simple to exploit, researchers discover
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 05:12
comments (3)
in cybersecurity@infosec.pub from cm0002@piefed.world on 30 Sep 2025 05:12
comments (3)
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
(thehackernews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Sep 2025 13:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Sep 2025 13:10
comments (0)
Hacking Campaign Has Breached Cisco Devices in US Government
(www.bloomberg.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Sep 2025 19:33
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Sep 2025 19:33
comments (0)
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
(cloud.google.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Sep 2025 18:03
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Sep 2025 18:03
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Sep 2025 17:46
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Sep 2025 17:46
comments (2)
Iranian Hackers Use Fake Job Lures to Breach Europe’s Critical Industries
(hackread.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Sep 2025 09:17
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Sep 2025 09:17
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Sep 2025 22:38
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Sep 2025 22:38
comments (0)
Safe by Default: Building a Minimal Sandbox in Linux
(medium.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Sep 2025 16:54
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Sep 2025 16:54
comments (2)
Privacy and Security Risks in the eSIM Ecosystem [pdf]
(www.usenix.org)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 22 Sep 2025 07:54
comments (3)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 22 Sep 2025 07:54
comments (3)
Microsoft’s Entra ID vulnerabilities could have been catastrophic
(arstechnica.com)
in cybersecurity@infosec.pub from Occhioverde@feddit.it on 21 Sep 2025 23:19
comments (2)
in cybersecurity@infosec.pub from Occhioverde@feddit.it on 21 Sep 2025 23:19
comments (2)
Heathrow flights delayed and cancelled as cyber-attack hits European airports
(www.theguardian.com)
in cybersecurity@infosec.pub from Blarylark@lemmy.world on 20 Sep 2025 23:14
comments (1)
in cybersecurity@infosec.pub from Blarylark@lemmy.world on 20 Sep 2025 23:14
comments (1)
Vulnerability-Lookup 2.16.0
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Sep 2025 16:14
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Sep 2025 16:14
comments (0)
Russia, China target German economy: Cyber attacks cost Germany almost 300 billion euros in past year, survey finds
(www.bitkom.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Sep 2025 15:30
comments (1)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Sep 2025 15:30
comments (1)
What use a smart card reader?
in cybersecurity@infosec.pub from BonkTheAnnoyed@lemmy.blahaj.zone on 18 Sep 2025 05:24
comments (0)
in cybersecurity@infosec.pub from BonkTheAnnoyed@lemmy.blahaj.zone on 18 Sep 2025 05:24
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Sep 2025 16:12
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Sep 2025 16:12
comments (0)
Satori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation - HUMAN Security
(www.humansecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 2025 16:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 2025 16:09
comments (0)
Apple releases iOS 15.8.5 security update for 10-year old iPhone 6s
(support.apple.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 2025 03:24
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Sep 2025 03:24
comments (0)
Self-Replicating Worm Hits 180+ Software Packages
(krebsonsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Sep 2025 23:57
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Sep 2025 23:57
comments (0)
Russian hackers target Polish hospitals and city water supply
(www.ft.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Sep 2025 11:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Sep 2025 11:10
comments (0)
Security researchers discover China-linked malware used to infiltrate Philippine military company
(businessinsights.bitdefender.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 15 Sep 2025 12:04
comments (1)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 15 Sep 2025 12:04
comments (1)
Never steal a hacker’s girlfriend’s phone: How an expert exposed a global network of thieves
(english.elpais.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 13 Sep 2025 12:38
comments (0)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 13 Sep 2025 12:38
comments (0)
Vulnerability Report - August 2025
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Sep 2025 16:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Sep 2025 16:06
comments (0)
China pilots village surveillance in Solomon Islands in the Pacific, where Chinese police are collecting fingerprints, palm prints to "curb social unrest"
(www.reuters.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Sep 2025 18:31
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 11 Sep 2025 18:31
comments (0)
Nokia CEO calls on EU to remove “high-risk vendors” - specifically China's Huawei and ZTE - from European networks
(coincentral.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 11 Sep 2025 16:57
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 11 Sep 2025 16:57
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Sep 2025 18:13
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Sep 2025 18:13
comments (1)
A look at a P2P camera (LookCam app)
(palant.info)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Sep 2025 16:22
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Sep 2025 16:22
comments (0)
npm debug and chalk packages compromised
(www.aikido.dev)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Sep 2025 19:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Sep 2025 19:47
comments (0)
Plex Media Server: Important Notice of Security Incident
(forums.plex.tv)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 2025 14:37
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 2025 14:37
comments (0)
Graphite, the Israeli spyware acquired by ICE
(english.elpais.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 2025 10:03
comments (3)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 2025 10:03
comments (3)
Ex-WhatsApp cybersecurity head says Meta endangered billions of users in new suit
(www.theguardian.com)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 2025 09:10
comments (0)
in cybersecurity@infosec.pub from TheDwZ@lemmy.world on 09 Sep 2025 09:10
comments (0)
18 Popular Code Packages Hacked, Rigged to Steal Crypto – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 2025 02:44
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 09 Sep 2025 02:44
comments (0)
Czech cyber agency flags Chinese espionage risks to critical infrastructure
(securityaffairs.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 08 Sep 2025 15:32
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 08 Sep 2025 15:32
comments (0)
Double trouble with CastleRAT malware, now in C and Python
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Sep 2025 19:26
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Sep 2025 19:26
comments (0)
ImaginaryCTF 2025 | September 5-7, 12 PM PDT | a cybersecurity CTF competition with a variety of challenges for all skill levels
(2025.imaginaryctf.org)
in cybersecurity@infosec.pub from otter@lemmy.ca on 05 Sep 2025 22:28
comments (0)
in cybersecurity@infosec.pub from otter@lemmy.ca on 05 Sep 2025 22:28
comments (0)
Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 05 Sep 2025 07:42
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 05 Sep 2025 07:42
comments (0)
The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest.
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Sep 2025 01:54
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Sep 2025 01:54
comments (3)
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 2025 19:35
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 2025 19:35
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 2025 16:10
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 2025 16:10
comments (1)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 21:48
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 21:48
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 21:45
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 2025 21:45
comments (0)
Cybersecurity News Review - Week 35 (2025)
(cybernewsweekly.substack.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 20:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 20:47
comments (0)
New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 2025 16:34
comments (2)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 2025 16:34
comments (2)
Two New feeds from CERT-FR integrated in Vulnerability-Lookup
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 15:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 2025 15:47
comments (0)
Netherlands Confirms China’s Salt Typhoon Hacking Group Targeted Small Dutch Telcos
(www.infosecurity-magazine.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Aug 2025 15:06
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Aug 2025 15:06
comments (0)
Catch-22: Uncovering Compromised Hosts using SSH Public Keys | USENIX
(www.usenix.org)
in cybersecurity@infosec.pub from jstangroome@infosec.pub on 29 Aug 2025 02:30
comments (0)
in cybersecurity@infosec.pub from jstangroome@infosec.pub on 29 Aug 2025 02:30
comments (0)
UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks
(www.ncsc.gov.uk)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Aug 2025 07:06
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Aug 2025 07:06
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Aug 2025 16:56
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Aug 2025 16:56
comments (2)
The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says
(www.nytimes.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 27 Aug 2025 10:14
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 27 Aug 2025 10:14
comments (0)
Vulnerability-Lookup 2.15.0 released
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 2025 16:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 2025 16:07
comments (0)
BCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourg
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 2025 16:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 2025 16:06
comments (0)
I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doors
(bobdahacker.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Aug 2025 22:35
comments (12)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Aug 2025 22:35
comments (12)
Hackers access data of 850,000 Orange Belgium customers
(www.euractiv.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 22 Aug 2025 13:42
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 22 Aug 2025 13:42
comments (0)
How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) | bobdahacker
(bobdahacker.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 20 Aug 2025 17:20
comments (6)
in cybersecurity@infosec.pub from cm0002@piefed.world on 20 Aug 2025 17:20
comments (6)
[Meta] Can you allow the English language posts?
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Aug 2025 16:49
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Aug 2025 16:49
comments (1)
UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity risks
(www.artificialintelligence-news.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 2025 12:26
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 2025 12:26
comments (0)
Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To China
(citizenlab.ca)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 2025 12:13
comments (1)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 2025 12:13
comments (1)
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
(research.kudelskisecurity.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 2025 18:54
comments (2)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 2025 18:54
comments (2)
Intel Outside: Hacking every Intel employee and various internal websites
(eaton-works.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 2025 15:56
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 2025 15:56
comments (1)
Cyber attack exposes details of more than 200,000 iinet customers
(www.abc.net.au)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 19 Aug 2025 09:00
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 19 Aug 2025 09:00
comments (0)
Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Tools
(cybersrcc.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 Aug 2025 08:04
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 Aug 2025 08:04
comments (0)
Google's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdot
(yro.slashdot.org)
in cybersecurity@infosec.pub from cm0002@piefed.world on 18 Aug 2025 16:12
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 18 Aug 2025 16:12
comments (1)
Citizen Lab director warns Black Hat security conference about authoritarian descent
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 17 Aug 2025 12:31
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 17 Aug 2025 12:31
comments (0)
LLM chatbots trivial to weaponize for data theft, say boffins
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 2025 19:34
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 2025 19:34
comments (0)
SoupDealer Malware Bypasses Every Sandbox, AV's and EDR/XDR in Real-World Incidents
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 2025 02:26
comments (8)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 2025 02:26
comments (8)
MadeYouReset: Turning HTTP/2 Server Against Itself | Imperva
(www.imperva.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 15 Aug 2025 15:55
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 15 Aug 2025 15:55
comments (0)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition
(vreme.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 13 Aug 2025 15:02
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 13 Aug 2025 15:02
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks
(www.aspistrategist.org.au)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 06:51
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 Aug 2025 06:51
comments (0)
Docker Hub still hosts dozens of Linux images with the XZ backdoor
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Aug 2025 21:14
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Aug 2025 21:14
comments (1)
Adult sites trick users into Liking Facebook posts using a clickjack Trojan
(www.malwarebytes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Aug 2025 15:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Aug 2025 15:58
comments (0)
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 12 Aug 2025 06:55
comments (3)
in cybersecurity@infosec.pub from cm0002@piefed.world on 12 Aug 2025 06:55
comments (3)
BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 10 Aug 2025 01:08
comments (4)
in cybersecurity@infosec.pub from cm0002@piefed.world on 10 Aug 2025 01:08
comments (4)
Flipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 04:32
comments (27)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 04:32
comments (27)
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 04:21
comments (20)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 2025 04:21
comments (20)
DEFCON Twitch Streams are live
(dctv.defcon.org)
in cybersecurity@infosec.pub from scytale@piefed.zip on 08 Aug 2025 19:42
comments (0)
in cybersecurity@infosec.pub from scytale@piefed.zip on 08 Aug 2025 19:42
comments (0)
Oops Safari, I think You Spilled Something!
(blog.exodusintel.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Aug 2025 11:53
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Aug 2025 11:53
comments (0)
Cyber Resilience Corps - Protecting America's Communities Together
(www.cybervolunteers.us)
in cybersecurity@infosec.pub from ryokimball@infosec.pub on 08 Aug 2025 02:42
comments (0)
in cybersecurity@infosec.pub from ryokimball@infosec.pub on 08 Aug 2025 02:42
comments (0)
HTTP/1.1 Must Die: What This Means for AppSec Leadership
(portswigger.net)
in cybersecurity@infosec.pub from cron@feddit.org on 07 Aug 2025 23:31
comments (1)
in cybersecurity@infosec.pub from cron@feddit.org on 07 Aug 2025 23:31
comments (1)
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault
(cyata.ai)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Aug 2025 11:01
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Aug 2025 11:01
comments (0)
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Aug 2025 05:18
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Aug 2025 05:18
comments (0)
Google suffers data breach in ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 19:45
comments (0)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 19:45
comments (0)
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 19:44
comments (0)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 2025 19:44
comments (0)
ReVault! When your SoC turns against you…
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Aug 2025 16:16
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Aug 2025 16:16
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Aug 2025 15:58
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Aug 2025 15:58
comments (0)
Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistance
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Aug 2025 10:59
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Aug 2025 10:59
comments (2)
ClickTok: The SparkKitty Drop on TikTok Shops
(www.ctm360.com)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 19:13
comments (0)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 19:13
comments (0)
Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integrity
(cispa.de)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 11:14
comments (0)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 11:14
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Aug 2025 16:21
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Aug 2025 16:21
comments (0)
Lazarus Group rises again, this time with fake FOSS
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Aug 2025 05:00
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Aug 2025 05:00
comments (0)
Internet exchange points are ignored, vulnerable, and absent from infrastructure protection plans
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Aug 2025 01:51
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Aug 2025 01:51
comments (0)
New 'Shade BIOS' Technique Beats Every Kind of Security
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Aug 2025 20:41
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Aug 2025 20:41
comments (2)
Scammers Unleash Flood of Slick Online Gaming Sites
(krebsonsecurity.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 22:45
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 22:45
comments (1)
Handling malicious requests with fail2ban
(sergiocipriano.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 18:10
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 18:10
comments (5)
Palo Alto to scoop up CyberArk for $25 billion to tackle AI-era threats
(finance.yahoo.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 16:39
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 16:39
comments (0)
Cobalt Strike Beacon delivered via GitHub and social media
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 12:39
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 12:39
comments (0)
CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 05:35
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 05:35
comments (0)
Vulnerability-Lookup 2.14.0 released
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 22:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 22:52
comments (0)
Apple’s New Containerization Feature Allows Kali Linux Integration on macOS
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 21:46
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 21:46
comments (5)
Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 Jul 2025 18:14
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 Jul 2025 18:14
comments (0)
The Huawei Dilemma: Why Europe Needs Strong Intelligence Guardrails
(www.thecipherbrief.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Jul 2025 14:09
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Jul 2025 14:09
comments (0)
Security pros are drowning in threat-intel data and it's making everything more dangerous
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 05:52
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 05:52
comments (1)
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
(www.helpnetsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jul 2025 22:03
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jul 2025 22:03
comments (1)
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 Jul 2025 19:49
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 Jul 2025 19:49
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Jul 2025 18:28
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Jul 2025 18:28
comments (0)
Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@programming.dev on 26 Jul 2025 20:46
comments (1)
in cybersecurity@infosec.pub from cm0002@programming.dev on 26 Jul 2025 20:46
comments (1)
DNS security is important but DNSSEC may be a failed experiment
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 19:41
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 19:41
comments (0)
UNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwords
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 08:43
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 08:43
comments (1)
ArcaneChat 2.6.0 released with major security enhancement
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:09
comments (0)
AI-Generated Malware in Panda Image Hides Persistent Linux Threat
(www.aquasec.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:07
comments (8)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:07
comments (8)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jul 2025 15:00
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jul 2025 15:00
comments (0)
Hacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agent
(www.404media.co)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 05:24
comments (4)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 05:24
comments (4)
Phishers Target Aviation Execs to Scam Customers
(krebsonsecurity.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 22:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 22:19
comments (0)
A chit-chat between Llama 2 and ChatGPT for the automated creation of exploits
(www.sciencedirect.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 02:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 02:19
comments (0)
Operation Grayskull Culminates in Lengthy Sentences for Managers of Dark Web Site Dedicated to Sexual Abuse of Children
(www.justice.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 00:42
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 00:42
comments (1)
[JS Required] xss.is got shutdown.
(www.europol.europa.eu)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 20:22
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 20:22
comments (0)
The Com: Theft, Extortion, and Violence are a Rising Threat to Youth Online
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:52
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:52
comments (0)
Hacker Com: Cyber Criminal Subset of The Community (Com) is a Rising Threat to Youth Online
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
In Real Life (IRL) Com: Violent Subset of The Community (Com) is a Rising Threat to Youth Online(
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old company
(www.hindustantimes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jul 2025 16:12
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jul 2025 16:12
comments (3)
"The Irish State pays for China's surveillance in Ireland:" Rights group criticizes government as thousands of China's Hikvision cameras are installed across Ireland despite bans in other countries
(www.iccl.ie)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Jul 2025 12:33
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Jul 2025 12:33
comments (0)
Joint Advisory Issued on Protecting Against Interlock Ransomware
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 22 Jul 2025 18:08
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 22 Jul 2025 18:08
comments (0)
A 0-day flaw in Microsoft SharePoint is being exploited in RCE attacks on servers globally; no patch exists and tens of thousands of servers are at risk
(research.eye.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 Jul 2025 00:30
comments (4)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 Jul 2025 00:30
comments (4)
Active Global Attacks Targeting On-premises SharePoint Server (CVE-2025-53770)
(msrc.microsoft.com)
in cybersecurity@infosec.pub from mhewitt@infosec.pub on 20 Jul 2025 19:46
comments (0)
in cybersecurity@infosec.pub from mhewitt@infosec.pub on 20 Jul 2025 19:46
comments (0)
Firmware Vulnerabilities Continue to Plague Supply Chain
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Jul 2025 08:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Jul 2025 08:47
comments (0)
Before Vegas: The “Red Hackers” Who Shaped China’s Cyber Ecosystem
(css.ethz.ch)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jul 2025 21:07
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jul 2025 21:07
comments (0)
Spain: Chinese company Huawei must not be allowed access to wiretap data in 'normalisation of censorship and surveillance', rights group says
(www.article19.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 18:47
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 18:47
comments (0)
US aims to ban Chinese technology in undersea telecommunications cables over security concerns
(www.reuters.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 16:19
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 16:19
comments (0)
Russia’s war against Ukraine, China’s coercive actions toward Taiwan very likely 'primary drivers' of state-linked sabotage targeting submarine cable infrastructure, report says
(www.recordedfuture.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 18 Jul 2025 15:28
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 18 Jul 2025 15:28
comments (0)
Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network
(securityaffairs.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 07:11
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 07:11
comments (0)
The Invisible Risks of Insecure Chinese Surveillance Cameras
(chinaobservers.eu)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 17 Jul 2025 19:16
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 17 Jul 2025 19:16
comments (0)
Malware in DNS - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
VLAI Hugging Face Set
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
GhostContainer backdoor for Exchange servers
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 17 Jul 2025 12:05
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 17 Jul 2025 12:05
comments (0)