Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 19:35
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 03 Sep 19:35
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 16:10
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Sep 16:10
comments (1)
WhatsApp fixes ‘zero-click’ bug used to hack Apple users with spyware
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 21:48
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 21:48
comments (0)
FBI says China’s Salt Typhoon hacked at least 200 US companies
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 21:45
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 29 Aug 21:45
comments (0)
Cybersecurity News Review - Week 35 (2025)
(cybernewsweekly.substack.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 20:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 20:47
comments (0)
New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 16:34
comments (2)
in cybersecurity@infosec.pub from cm0002@piefed.world on 29 Aug 16:34
comments (2)
Two New feeds from CERT-FR integrated in Vulnerability-Lookup
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 15:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Aug 15:47
comments (0)
Netherlands Confirms China’s Salt Typhoon Hacking Group Targeted Small Dutch Telcos
(www.infosecurity-magazine.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Aug 15:06
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Aug 15:06
comments (0)
Catch-22: Uncovering Compromised Hosts using SSH Public Keys | USENIX
(www.usenix.org)
in cybersecurity@infosec.pub from jstangroome@infosec.pub on 29 Aug 02:30
comments (0)
in cybersecurity@infosec.pub from jstangroome@infosec.pub on 29 Aug 02:30
comments (0)
UK and allies expose China-based technology companies for enabling global cyber campaign against critical networks
(www.ncsc.gov.uk)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Aug 07:06
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Aug 07:06
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Aug 16:56
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Aug 16:56
comments (2)
The entire US Social Security database was uploaded on a random cloud server, Whistle-Blower Says
(www.nytimes.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 27 Aug 10:14
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 27 Aug 10:14
comments (0)
Vulnerability-Lookup 2.15.0 released
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 16:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 16:07
comments (0)
BCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourg
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 16:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Aug 16:06
comments (0)
I Hacked Monster Energy and You Won't Believe What They Think You Look Like: The Energy Drink Giant That Forgot to Lock Its Doors
(bobdahacker.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Aug 22:35
comments (12)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Aug 22:35
comments (12)
Hackers access data of 850,000 Orange Belgium customers
(www.euractiv.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 22 Aug 13:42
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 22 Aug 13:42
comments (0)
How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) | bobdahacker
(bobdahacker.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 20 Aug 17:20
comments (6)
in cybersecurity@infosec.pub from cm0002@piefed.world on 20 Aug 17:20
comments (6)
[Meta] Can you allow the English language posts?
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Aug 16:49
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Aug 16:49
comments (1)
UK information chiefs demand urgent regulation of AI like DeepSeek over cybersecurity risks
(www.artificialintelligence-news.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 12:26
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 12:26
comments (0)
Citizen Lab Researchers Expose Hidden VPN Networks Sharing Ownership and Security Flaws Linked To China
(citizenlab.ca)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 12:13
comments (1)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 20 Aug 12:13
comments (1)
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
(research.kudelskisecurity.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 18:54
comments (2)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 18:54
comments (2)
Intel Outside: Hacking every Intel employee and various internal websites
(eaton-works.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 15:56
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 19 Aug 15:56
comments (1)
Cyber attack exposes details of more than 200,000 iinet customers
(www.abc.net.au)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 19 Aug 09:00
comments (0)
in cybersecurity@infosec.pub from vk6flab@lemmy.radio on 19 Aug 09:00
comments (0)
Espionage Surge: China-Linked Hackers Target African Government IT Infrastructure Using SharePoint and Stealthy Tools
(cybersrcc.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 Aug 08:04
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 Aug 08:04
comments (0)
Google's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdot
(yro.slashdot.org)
in cybersecurity@infosec.pub from cm0002@piefed.world on 18 Aug 16:12
comments (1)
in cybersecurity@infosec.pub from cm0002@piefed.world on 18 Aug 16:12
comments (1)
Citizen Lab director warns Black Hat security conference about authoritarian descent
(techcrunch.com)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 17 Aug 12:31
comments (0)
in cybersecurity@infosec.pub from Davriellelouna@lemmy.world on 17 Aug 12:31
comments (0)
LLM chatbots trivial to weaponize for data theft, say boffins
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 19:34
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 19:34
comments (0)
SoupDealer Malware Bypasses Every Sandbox, AV's and EDR/XDR in Real-World Incidents
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 02:26
comments (8)
in cybersecurity@infosec.pub from cm0002@piefed.world on 16 Aug 02:26
comments (8)
MadeYouReset: Turning HTTP/2 Server Against Itself | Imperva
(www.imperva.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 15 Aug 15:55
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 15 Aug 15:55
comments (0)
Serbia is secretly expanding Chinese surveillance system despite EU warnings and local opposition
(vreme.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 13 Aug 15:02
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 13 Aug 15:02
comments (0)
Digital siege puts Taiwan’s resilience to the test: Taipei bets on transparency, civil society as China increases cyber attacks
(www.aspistrategist.org.au)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 Aug 06:51
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 Aug 06:51
comments (0)
Docker Hub still hosts dozens of Linux images with the XZ backdoor
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Aug 21:14
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Aug 21:14
comments (1)
Adult sites trick users into Liking Facebook posts using a clickjack Trojan
(www.malwarebytes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Aug 15:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Aug 15:58
comments (0)
Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 12 Aug 06:55
comments (3)
in cybersecurity@infosec.pub from cm0002@piefed.world on 12 Aug 06:55
comments (3)
BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 10 Aug 01:08
comments (4)
in cybersecurity@infosec.pub from cm0002@piefed.world on 10 Aug 01:08
comments (4)
Flipper Zero 'DarkWeb' Firmware Bypasses Rolling Code Security on Major Vehicle Brands
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 04:32
comments (27)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 04:32
comments (27)
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 04:21
comments (20)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Aug 04:21
comments (20)
DEFCON Twitch Streams are live
(dctv.defcon.org)
in cybersecurity@infosec.pub from scytale@piefed.zip on 08 Aug 19:42
comments (0)
in cybersecurity@infosec.pub from scytale@piefed.zip on 08 Aug 19:42
comments (0)
Oops Safari, I think You Spilled Something!
(blog.exodusintel.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Aug 11:53
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Aug 11:53
comments (0)
Cyber Resilience Corps - Protecting America's Communities Together
(www.cybervolunteers.us)
in cybersecurity@infosec.pub from ryokimball@infosec.pub on 08 Aug 02:42
comments (0)
in cybersecurity@infosec.pub from ryokimball@infosec.pub on 08 Aug 02:42
comments (0)
HTTP/1.1 Must Die: What This Means for AppSec Leadership
(portswigger.net)
in cybersecurity@infosec.pub from cron@feddit.org on 07 Aug 23:31
comments (1)
in cybersecurity@infosec.pub from cron@feddit.org on 07 Aug 23:31
comments (1)
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault
(cyata.ai)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Aug 11:01
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Aug 11:01
comments (0)
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Aug 05:18
comments (0)
in cybersecurity@infosec.pub from cm0002@piefed.world on 07 Aug 05:18
comments (0)
Google suffers data breach in ongoing Salesforce data theft attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 19:45
comments (0)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 19:45
comments (0)
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 19:44
comments (0)
in cybersecurity@infosec.pub from TehBamski@lemmy.world on 06 Aug 19:44
comments (0)
ReVault! When your SoC turns against you…
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Aug 16:16
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Aug 16:16
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Aug 15:58
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Aug 15:58
comments (0)
Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistance
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Aug 10:59
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Aug 10:59
comments (2)
ClickTok: The SparkKitty Drop on TikTok Shops
(www.ctm360.com)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 19:13
comments (0)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 19:13
comments (0)
Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integrity
(cispa.de)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 11:14
comments (0)
in cybersecurity@infosec.pub from Pro@mander.xyz on 05 Aug 2025 11:14
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Aug 2025 16:21
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Aug 2025 16:21
comments (0)
Lazarus Group rises again, this time with fake FOSS
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Aug 2025 05:00
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Aug 2025 05:00
comments (0)
Internet exchange points are ignored, vulnerable, and absent from infrastructure protection plans
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Aug 2025 01:51
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Aug 2025 01:51
comments (0)
New 'Shade BIOS' Technique Beats Every Kind of Security
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Aug 2025 20:41
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Aug 2025 20:41
comments (2)
Scammers Unleash Flood of Slick Online Gaming Sites
(krebsonsecurity.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 22:45
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 22:45
comments (1)
Handling malicious requests with fail2ban
(sergiocipriano.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 18:10
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 18:10
comments (5)
Palo Alto to scoop up CyberArk for $25 billion to tackle AI-era threats
(finance.yahoo.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 16:39
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 16:39
comments (0)
Cobalt Strike Beacon delivered via GitHub and social media
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 12:39
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 30 Jul 2025 12:39
comments (0)
CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 05:35
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jul 2025 05:35
comments (0)
Vulnerability-Lookup 2.14.0 released
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 22:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 22:52
comments (0)
Apple’s New Containerization Feature Allows Kali Linux Integration on macOS
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 21:46
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 21:46
comments (5)
Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 Jul 2025 18:14
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 Jul 2025 18:14
comments (0)
The Huawei Dilemma: Why Europe Needs Strong Intelligence Guardrails
(www.thecipherbrief.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Jul 2025 14:09
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 29 Jul 2025 14:09
comments (0)
Security pros are drowning in threat-intel data and it's making everything more dangerous
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 05:52
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 29 Jul 2025 05:52
comments (1)
Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities
(www.helpnetsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jul 2025 22:03
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jul 2025 22:03
comments (1)
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 Jul 2025 19:49
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 Jul 2025 19:49
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Jul 2025 18:28
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Jul 2025 18:28
comments (0)
Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@programming.dev on 26 Jul 2025 20:46
comments (1)
in cybersecurity@infosec.pub from cm0002@programming.dev on 26 Jul 2025 20:46
comments (1)
DNS security is important but DNSSEC may be a failed experiment
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 19:41
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 19:41
comments (0)
UNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwords
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 08:43
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 Jul 2025 08:43
comments (1)
ArcaneChat 2.6.0 released with major security enhancement
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:09
comments (0)
AI-Generated Malware in Panda Image Hides Persistent Linux Threat
(www.aquasec.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:07
comments (8)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 16:07
comments (8)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jul 2025 15:00
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jul 2025 15:00
comments (0)
Hacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agent
(www.404media.co)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 05:24
comments (4)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jul 2025 05:24
comments (4)
Phishers Target Aviation Execs to Scam Customers
(krebsonsecurity.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 22:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 22:19
comments (0)
A chit-chat between Llama 2 and ChatGPT for the automated creation of exploits
(www.sciencedirect.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 02:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 02:19
comments (0)
Operation Grayskull Culminates in Lengthy Sentences for Managers of Dark Web Site Dedicated to Sexual Abuse of Children
(www.justice.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 00:42
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 Jul 2025 00:42
comments (1)
[JS Required] xss.is got shutdown.
(www.europol.europa.eu)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 20:22
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 20:22
comments (0)
The Com: Theft, Extortion, and Violence are a Rising Threat to Youth Online
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:52
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:52
comments (0)
Hacker Com: Cyber Criminal Subset of The Community (Com) is a Rising Threat to Youth Online
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
In Real Life (IRL) Com: Violent Subset of The Community (Com) is a Rising Threat to Youth Online(
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jul 2025 18:34
comments (0)
‘If you are reading…’: This password ‘mistake’ shuts down a 158-year-old company
(www.hindustantimes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jul 2025 16:12
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jul 2025 16:12
comments (3)
"The Irish State pays for China's surveillance in Ireland:" Rights group criticizes government as thousands of China's Hikvision cameras are installed across Ireland despite bans in other countries
(www.iccl.ie)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Jul 2025 12:33
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Jul 2025 12:33
comments (0)
Joint Advisory Issued on Protecting Against Interlock Ransomware
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 22 Jul 2025 18:08
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 22 Jul 2025 18:08
comments (0)
A 0-day flaw in Microsoft SharePoint is being exploited in RCE attacks on servers globally; no patch exists and tens of thousands of servers are at risk
(research.eye.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 Jul 2025 00:30
comments (4)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 Jul 2025 00:30
comments (4)
Active Global Attacks Targeting On-premises SharePoint Server (CVE-2025-53770)
(msrc.microsoft.com)
in cybersecurity@infosec.pub from mhewitt@infosec.pub on 20 Jul 2025 19:46
comments (0)
in cybersecurity@infosec.pub from mhewitt@infosec.pub on 20 Jul 2025 19:46
comments (0)
Firmware Vulnerabilities Continue to Plague Supply Chain
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Jul 2025 08:47
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Jul 2025 08:47
comments (0)
Before Vegas: The “Red Hackers” Who Shaped China’s Cyber Ecosystem
(css.ethz.ch)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jul 2025 21:07
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jul 2025 21:07
comments (0)
Spain: Chinese company Huawei must not be allowed access to wiretap data in 'normalisation of censorship and surveillance', rights group says
(www.article19.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 18:47
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 18:47
comments (0)
US aims to ban Chinese technology in undersea telecommunications cables over security concerns
(www.reuters.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 16:19
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 16:19
comments (0)
Russia’s war against Ukraine, China’s coercive actions toward Taiwan very likely 'primary drivers' of state-linked sabotage targeting submarine cable infrastructure, report says
(www.recordedfuture.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 18 Jul 2025 15:28
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 18 Jul 2025 15:28
comments (0)
Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network
(securityaffairs.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 07:11
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 18 Jul 2025 07:11
comments (0)
The Invisible Risks of Insecure Chinese Surveillance Cameras
(chinaobservers.eu)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 17 Jul 2025 19:16
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 17 Jul 2025 19:16
comments (0)
Malware in DNS - DomainTools Investigations | DTI
(dti.domaintools.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
VLAI Hugging Face Set
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jul 2025 16:13
comments (0)
GhostContainer backdoor for Exchange servers
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 17 Jul 2025 12:05
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 17 Jul 2025 12:05
comments (0)
Europol and Eurojust disrupt pro-Russian hacktivist group NoName057(16) that has claimed responsibility for 1,000+ DDoS attacks since 2022, and make two arrests
(www.eurojust.europa.eu)
in cybersecurity@infosec.pub from Pro@programming.dev on 16 Jul 2025 20:23
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 16 Jul 2025 20:23
comments (0)
Afghans burnt by UK data leak because someone used email to send a large sensitive dataset -- which email service, anyone know?
(www.theguardian.com)
in cybersecurity@infosec.pub from evenwicht@lemmy.sdf.org on 16 Jul 2025 18:10
comments (3)
in cybersecurity@infosec.pub from evenwicht@lemmy.sdf.org on 16 Jul 2025 18:10
comments (3)
A Little-Known Microsoft Program Could Expose the U.S. Defense Department to Chinese Hackers
(www.propublica.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Jul 2025 11:41
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Jul 2025 11:41
comments (0)
Filch Stealer: A new infostealer leveraging old techniques
(www.rapid7.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 14 Jul 2025 21:06
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 14 Jul 2025 21:06
comments (0)
Nvidia warns of Rowhammer attacks on GPUs
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@programming.dev on 14 Jul 2025 05:56
comments (1)
in cybersecurity@infosec.pub from cm0002@programming.dev on 14 Jul 2025 05:56
comments (1)
Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car, was known for 13 years — operators refused to fix the issue until now
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@programming.dev on 14 Jul 2025 05:54
comments (2)
in cybersecurity@infosec.pub from cm0002@programming.dev on 14 Jul 2025 05:54
comments (2)
How to Prove False Statements: Practical Attacks on Fiat-Shamir
(eprint.iacr.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 Jul 2025 00:37
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 Jul 2025 00:37
comments (1)
Now everybody but Citrix agrees that CitrixBleed 2 is under exploit
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Jul 2025 19:24
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Jul 2025 19:24
comments (1)
CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 12 Jul 2025 13:14
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 12 Jul 2025 13:14
comments (1)
Vulnerability-Lookup 2.13.0
(discourse.ossbase.org)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 11 Jul 2025 23:21
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 11 Jul 2025 23:21
comments (0)
ChatGPT creates phisher’s paradise by serving wrong URLs
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 11 Jul 2025 18:18
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 11 Jul 2025 18:18
comments (0)
The Solidity Language open-source package was used in a $500,000 crypto heist
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 10 Jul 2025 18:49
comments (4)
in cybersecurity@infosec.pub from Pro@programming.dev on 10 Jul 2025 18:49
comments (4)
Ruckus Networks leaves severe flaws unpatched in management devices
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jul 2025 09:14
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jul 2025 09:14
comments (0)
The Czech Republic bans DeepSeek in state administration over cybersecurity concerns
(apnews.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 10 Jul 2025 07:53
comments (5)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 10 Jul 2025 07:53
comments (5)
AMD warns of new Meltdown, Spectre-like bugs affecting CPUs
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 10 Jul 2025 02:04
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 10 Jul 2025 02:04
comments (3)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Jul 2025 15:46
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Jul 2025 15:46
comments (0)
Act now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blog
(techcommunity.microsoft.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 09 Jul 2025 08:50
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 09 Jul 2025 08:50
comments (0)
Git security vulnerabilities announced
(github.blog)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Jul 2025 20:57
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Jul 2025 20:57
comments (0)
VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification
(huggingface.co)
in cybersecurity@infosec.pub from cm0002@programming.dev on 08 Jul 2025 16:55
comments (0)
in cybersecurity@infosec.pub from cm0002@programming.dev on 08 Jul 2025 16:55
comments (0)
Bluetooth flaws could let hackers spy through your microphone
(insinuator.net)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Jul 2025 00:31
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Jul 2025 00:31
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Jul 2025 18:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Jul 2025 18:36
comments (0)
How the Batavia spyware targeting Russian organizations works
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Jul 2025 18:35
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Jul 2025 18:35
comments (0)
Massive spike in use of .es domains for phishing abuse
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 07 Jul 2025 10:54
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 07 Jul 2025 10:54
comments (0)
Vulnerability Report - June 2025
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jul 2025 09:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jul 2025 09:58
comments (0)
Belgium is unsafe for CVD
(floort.net)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Jul 2025 22:03
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Jul 2025 22:03
comments (1)
New Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Finds
(www.silentpush.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 04 Jul 2025 07:47
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 04 Jul 2025 07:47
comments (0)
ChatGPT creates phisher’s paradise by serving wrong URLs
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jul 2025 19:27
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jul 2025 19:27
comments (1)
Qilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UK
(hackread.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 30 Jun 2025 07:32
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 30 Jun 2025 07:32
comments (0)
Canada orders China's Hikvision to close Canadian operations over national security concerns
(www.reuters.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Jun 2025 16:08
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Jun 2025 16:08
comments (0)
Citrix Bleed 2 flaw now believed to be exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jun 2025 07:01
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jun 2025 07:01
comments (0)
mommy Access Broker
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 2025 21:39
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 2025 21:39
comments (0)
Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraud
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 2025 20:33
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 2025 20:33
comments (0)
Authoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Study
(www.swp-berlin.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 27 Jun 2025 10:21
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 27 Jun 2025 10:21
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Jun 2025 06:05
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Jun 2025 06:05
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jun 2025 19:23
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jun 2025 19:23
comments (2)
How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets
(trufflesecurity.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 2025 10:52
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 2025 10:52
comments (0)
Pro-Russian hacktivism: Shifting alliances, new groups and risks
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 2025 10:24
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 2025 10:24
comments (0)
France: Chinese Hackers Exploited Ivanti Flaw Targeting Government Agencies, Telecoms, Firms In Media, Finance, Transport Sectors
(www.bankinfosecurity.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Jul 2025 08:13
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Jul 2025 08:13
comments (0)
Pro-Iran hacktivists borrow from Russia's cyber playbook
(www.axios.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Jul 2025 02:15
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Jul 2025 02:15
comments (0)
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@reddthat.com on 01 Jul 2025 22:57
comments (0)
in cybersecurity@infosec.pub from Pro@reddthat.com on 01 Jul 2025 22:57
comments (0)
US disrupts North Korean IT worker "laptop farm" scheme in 16 states
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 2025 21:43
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 2025 21:43
comments (1)
New FileFix attack runs JScript while bypassing Windows MoTW alerts
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 2025 21:43
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 2025 21:43
comments (0)
Break The Air Gap With Ultrasound
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 2025 17:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 2025 17:13
comments (0)
Hikvision Canada ordered to cease operations over security risks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jun 2025 19:08
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jun 2025 19:08
comments (0)
Stumbled on to StormShield - opinions?
(www.stormshield.com)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 30 Jun 2025 18:02
comments (0)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 30 Jun 2025 18:02
comments (0)
Librarian Ghouls carry out attacks with data theft and crypto miner deployment
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 09 Jun 2025 13:18
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 09 Jun 2025 13:18
comments (1)
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 2025 07:04
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 2025 07:04
comments (0)
ChatGPT used to disable SecureBoot in locked-down device – modded BIOS reflash facilitated fresh Windows and Linux installs
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Jun 2025 21:21
comments (8)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Jun 2025 21:21
comments (8)
Cybercriminals turn to “residential proxy” services to hide malicious traffic
(arstechnica.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 08 Jun 2025 14:50
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 08 Jun 2025 14:50
comments (1)
Millions of low-cost Android devices turn home networks into crime platforms
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jun 2025 20:20
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jun 2025 20:20
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Jun 2025 16:25
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Jun 2025 16:25
comments (0)
Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Jun 2025 03:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Jun 2025 03:58
comments (1)
Home Internet Connected Devices Facilitate Criminal Activity
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 22:38
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 22:38
comments (1)
Evidence of Zero-Click iPhones Exploitation Uncovered in the U.S.
(iverify.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 19:58
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 19:58
comments (2)
More than a hundred backdoored malware repos traced to single GitHub user
(news.sophos.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 18:06
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 18:06
comments (0)
The strange tale of ischhfd83: When cybercriminals eat their own
(news.sophos.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 14:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 14:37
comments (0)
Be Careful With Fake Zoom Client Downloads
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 12:40
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 12:40
comments (0)
Vulnerability-Lookup Discourse on Mastodon!
(lemmy.ml)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 09:10
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 09:10
comments (0)
Custom Active Directory Client-Side Extensions Enable Stealthy Corporate Backdoors
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 07:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 07:58
comments (0)
Europe leads the world in exposed solar power equipment, raising alarms on infrastructure security, report finds
(www.forescout.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 05 Jun 2025 06:38
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 05 Jun 2025 06:38
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Jun 2025 18:08
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Jun 2025 18:08
comments (1)
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Jun 2025 08:18
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Jun 2025 08:18
comments (0)
One-third of top U.S. cyber force has left since Trump took office
(www.axios.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 23:21
comments (4)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 23:21
comments (4)
Australia Begins New Ransomware Payment Disclosure Rules
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 23:10
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 23:10
comments (1)
Vulnerability Report - May 2025
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 08:48
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 08:48
comments (0)
Cartier discloses data breach amid fashion brand cyberattacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 07:22
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 07:22
comments (0)
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 07:20
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 07:20
comments (1)
Trump’s CISA budget lays out deep job cuts, program reductions
(www.cybersecuritydive.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 03:15
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 03:15
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Jun 2025 14:59
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Jun 2025 14:59
comments (0)
Simple SSH Backdoor
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 Jun 2025 09:34
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 Jun 2025 09:34
comments (0)
AI agents outperform human teams in hacking competitions
(the-decoder.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 01 Jun 2025 16:01
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 01 Jun 2025 16:01
comments (2)
Spain: Number of cyberattacks against critical infrastructure rose by 43% in 2024 and are 'typically state-sponsored,' report finds
(www.prosegur.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Jun 2025 10:46
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Jun 2025 10:46
comments (0)
Chinese spying on Dutch industries 'intensifying': Dutch defence minister
(www.reuters.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 31 May 2025 19:02
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 31 May 2025 19:02
comments (0)
The first day of @thotcon 0xD was a total blast! Before the presentations even got started I had the amazing Cliff Stoll sitting next to me imparting his wisdom, his jokes, and being a lot of fun! If
in cybersecurity@infosec.pub from corewarrior@infosec.exchange on 31 May 2025 04:19
comments (7)
in cybersecurity@infosec.pub from corewarrior@infosec.exchange on 31 May 2025 04:19
comments (7)
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
(www.greynoise.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 May 2025 09:13
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 May 2025 09:13
comments (0)
OneDrive File Picker Flaw Provides ChatGPT and Other Web Apps Full Read Access to Users’ Entire OneDrive
(www.oasis.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 17:23
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 17:23
comments (0)
Evolution of Zanubis, a banking Trojan for Android
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 16:18
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 16:18
comments (0)
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
(cloud.google.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 10:22
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 10:22
comments (0)
UK Envoy Urges Transatlantic Tech Alliance, Cites China Threat
(www.bloomberg.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 08:00
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 08:00
comments (0)
Dutch intelligence report says Russian hacker group stole data on 63,000 police officers, targeted NATO government systems
(theins.ru)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 07:45
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 07:45
comments (0)
CISA loses nearly all top officials as purge continues
(www.cybersecuritydive.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 20:23
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 20:23
comments (3)
NIST Introduces New Metric to Measure Likelihood of Vulnerability Exploits
(www.infosecurity-magazine.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 17:50
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 17:50
comments (0)
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 May 2025 13:06
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 May 2025 13:06
comments (0)
Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
(www.websiteplanet.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 18:11
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 18:11
comments (0)
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
(www.legitsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 18:11
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 18:11
comments (0)
Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack
(blog.kandji.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 May 2025 14:44
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 May 2025 14:44
comments (0)
A local server designed to load one or more pre-trained NLP models during startup and expose them through a clean, RESTful API
(github.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 16:17
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 16:17
comments (1)
270 arrested in global dark web crackdown targeting online drug and criminal networks | Europol
(www.europol.europa.eu)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 16:01
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 16:01
comments (0)
German Cyber Agency Sounds Warning on Grid Vulnerabilities across Europe
(www.bankinfosecurity.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 15:08
comments (2)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 15:08
comments (2)
DanaBot malware disrupted, threat actors named
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 May 2025 08:46
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 May 2025 08:46
comments (0)
Denmark finds ‘suspicious’ components in key infrastructure imports, raising concerns about espionage and energy security
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 08:00
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 08:00
comments (0)
Chinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report says
(gbhackers.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 22 May 2025 18:32
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 22 May 2025 18:32
comments (0)
New Variant of Crypto Confidence Scam
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 20:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 20:19
comments (0)
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 19:51
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 19:51
comments (0)
The US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 18:18
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 18:18
comments (0)
Dero miner spreads inside containerized Linux environments
(securelist.com)
in cybersecurity@infosec.pub from cm0002@lemmy.sdf.org on 21 May 2025 15:32
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.sdf.org on 21 May 2025 15:32
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 May 2025 13:35
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 May 2025 13:35
comments (1)
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 May 2025 20:09
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 May 2025 20:09
comments (0)
RVTools hit in supply chain attack to deliver Bumblebee malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 17:24
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 17:24
comments (0)
All things infostealers. Week 20, 2025 – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 20 May 2025 12:54
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 20 May 2025 12:54
comments (0)
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server
(micahflee.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 03:16
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 03:16
comments (5)
Top 5 Advances in Unsupervised Learning for Cybersecurity
(rackenzik.com)
in cybersecurity@infosec.pub from Rackenzik@lemmy.sdf.org on 19 May 2025 19:09
comments (0)
in cybersecurity@infosec.pub from Rackenzik@lemmy.sdf.org on 19 May 2025 19:09
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 May 2025 15:00
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 May 2025 15:00
comments (0)
VMware Hacked As $150,000 Zero-Day Exploit Dropped
(www.forbes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 14:59
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 14:59
comments (3)