New Variant of Crypto Confidence Scam
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 20:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 20:19
comments (0)
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 19:51
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 19:51
comments (0)
The US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 18:18
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 18:18
comments (0)
Dero miner spreads inside containerized Linux environments
(securelist.com)
in cybersecurity@infosec.pub from cm0002@lemmy.sdf.org on 21 May 15:32
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.sdf.org on 21 May 15:32
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 May 13:35
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 May 13:35
comments (1)
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 May 20:09
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 May 20:09
comments (0)
RVTools hit in supply chain attack to deliver Bumblebee malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 17:24
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 17:24
comments (0)
All things infostealers. Week 20, 2025 – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 20 May 12:54
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 20 May 12:54
comments (0)
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server
(micahflee.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 03:16
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 03:16
comments (5)
Top 5 Advances in Unsupervised Learning for Cybersecurity
(rackenzik.com)
in cybersecurity@infosec.pub from Rackenzik@lemmy.sdf.org on 19 May 19:09
comments (0)
in cybersecurity@infosec.pub from Rackenzik@lemmy.sdf.org on 19 May 19:09
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 May 15:00
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 May 15:00
comments (0)
VMware Hacked As $150,000 Zero-Day Exploit Dropped
(www.forbes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:59
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:59
comments (3)
Detecting malicious Unicode
(daniel.haxx.se)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:55
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:55
comments (0)
USN-7292-1: Dropbear vulnerabilities | Ubuntu security notices | Ubuntu
(ubuntu.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:52
comments (0)
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
(www.justice.gov)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 14:52
comments (0)
Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraine
(web.archive.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 09:35
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 09:35
comments (0)
Russian hackers are interested in chaos and money, says NATO cyber defense director
(news.err.ee)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 08:57
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 08:57
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 May 14:06
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 May 14:06
comments (2)
Divine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australia
(www.defenceconnect.com.au)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 May 07:41
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 May 07:41
comments (0)
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabia
(blog.eclecticiq.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 14 May 15:49
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 14 May 15:49
comments (0)
89 million Steam account details just got leaked, so now's a good time to change your password
(www.xda-developers.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 May 15:42
comments (13)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 May 15:42
comments (13)
Researchers discover new security vulnerability in Intel processors
(ethz.ch)
in cybersecurity@infosec.pub from Pro@programming.dev on 14 May 13:09
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 14 May 13:09
comments (0)
Intel data-leaking Spectre defenses scared off once again
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 14 May 00:53
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 14 May 00:53
comments (0)
RSS feed for CISA KEV vulnerabilities, powered by Vulnerability-Lookup
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 22:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 22:58
comments (0)
Britain’s intelligence services see “direct connection between Russian cyber attacks and physical threats to our security"
(therecord.media)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 May 18:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 May 18:10
comments (0)
CISA mutes own website, shifts routine cyber alerts to Musk’s X, RSS, email • The Register
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 08:21
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 08:21
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 May 20:54
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 May 20:54
comments (1)
Textbook and testing giant Pearson hit by cyberattack, customer data leaked
(www.techradar.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 May 20:18
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 May 20:18
comments (2)
Nvidia RTX 5090 can crack an 8-digit passcode in just 3 hours — password cracking benchmarks show tremendous performance
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 23:15
comments (9)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 23:15
comments (9)
Supply chain attack hits npm package with 45,000 weekly downloads
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 16:51
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 16:51
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 May 14:57
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 May 14:57
comments (0)
Kickidler employee monitoring software abused in ransomware attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 03:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 03:12
comments (0)
DOGE software engineer’s computer infected by info-stealing malware
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 00:02
comments (13)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 00:02
comments (13)
Operation PowerOFF Takes Down 9 DDoS Domains
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 21:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 21:09
comments (0)
UK under assault as number of ‘significant’ cyberattacks doubles: Foreign powers, ransomware gangs, AI threats drive surge in incidents affecting private businesses and government systems
(www.thetimes.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 08 May 13:39
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 08 May 13:39
comments (0)
Backdoor found in popular ecommerce components
(sansec.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 18:57
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 18:57
comments (0)
Vulnerability-Lookup 2.9.0 - MITRE EMB3D, GCVE
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 May 17:23
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 May 17:23
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 May 17:11
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 May 17:11
comments (1)
Return of the Crypto Inferno Drainer
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 12:48
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 12:48
comments (0)
Italy: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national security
(decode39.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 06 May 16:33
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 06 May 16:33
comments (0)
Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 May 16:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 May 16:13
comments (0)
Basic analysis of Kidflix users’ passwords – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 06 May 12:26
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 06 May 12:26
comments (0)
China has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weapons
(www.taipeitimes.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 May 11:03
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 May 11:03
comments (0)
"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 May 10:04
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 May 10:04
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 May 16:09
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 May 16:09
comments (1)
All things infostealers. Week 18, 2025 – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 05 May 08:16
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 05 May 08:16
comments (0)
How NSA Can Spy on Air-Gapped Networks? Meet FIREWALK
(www.youtube.com)
in cybersecurity@infosec.pub from kugmo@sh.itjust.works on 02 May 19:30
comments (0)
in cybersecurity@infosec.pub from kugmo@sh.itjust.works on 02 May 19:30
comments (0)
Disney Slack hacker was Californian, not Russian
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 02 May 19:06
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 02 May 19:06
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 May 14:28
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 May 14:28
comments (4)
A Flaw With the Security Level Slider in Tor Browser
(www.privacyguides.org)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 May 14:16
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 May 14:16
comments (0)
🚨 April 2025 Vulnerability Report is out! 🚨
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 16:27
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 16:27
comments (0)
Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 08:02
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 08:02
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Apr 07:00
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Apr 07:00
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Apr 15:47
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Apr 15:47
comments (0)
A Python client for the Global CVE Allocation System.
(github.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Apr 10:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Apr 10:06
comments (0)
Chinese hackers undertaking global infiltration campaign across 12 countries and 20 industries
(teamt5.org)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Apr 19:05
comments (1)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Apr 19:05
comments (1)
America's cyber defenses are being dismantled from the inside
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Apr 16:25
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Apr 16:25
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Apr 14:56
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Apr 14:56
comments (0)
AI models can generate exploit code at lightning speed
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Apr 04:34
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Apr 04:34
comments (6)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Apr 2025 15:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Apr 2025 15:36
comments (0)
What are your methods to harden *nix servers?
in cybersecurity@infosec.pub from fishynoob@infosec.pub on 19 Apr 2025 07:42
comments (8)
in cybersecurity@infosec.pub from fishynoob@infosec.pub on 19 Apr 2025 07:42
comments (8)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Apr 2025 16:33
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Apr 2025 16:33
comments (4)
GCVE: Global CVE Allocation System
(gcve.eu)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 20:57
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 20:57
comments (0)
ActiveX blocked by default in Microsoft 365 because remote code execution is bad, OK?
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 17:45
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 17:45
comments (2)
Researchers claim breakthrough in fight against AI’s frustrating security hole
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 17:30
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 17:30
comments (1)
Renewed Russian Phishing Campaign Against European Diplomats
(research.checkpoint.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 16 Apr 2025 16:36
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 16 Apr 2025 16:36
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Apr 2025 06:08
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Apr 2025 06:08
comments (0)
The CVE program for tracking security flaws is about to lose federal funding
(www.theverge.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 04:54
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 04:54
comments (6)
MITRE funding for the Common Vulnerabilities and Exposures (CVE) program will expire on April 16th
(infosec.exchange)
in cybersecurity@infosec.pub from CyberSeeker@discuss.tchncs.de on 16 Apr 2025 00:50
comments (1)
in cybersecurity@infosec.pub from CyberSeeker@discuss.tchncs.de on 16 Apr 2025 00:50
comments (1)
Landmark Admin now says info on 1.6M people stolen from it
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 00:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 00:12
comments (0)
Threat actors misuse Node.js to deliver malware and other malicious payloads
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Apr 2025 22:45
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Apr 2025 22:45
comments (1)
4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War
(www.404media.co)
in cybersecurity@infosec.pub from Deebster@infosec.pub on 15 Apr 2025 19:50
comments (11)
in cybersecurity@infosec.pub from Deebster@infosec.pub on 15 Apr 2025 19:50
comments (11)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Apr 2025 14:38
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Apr 2025 14:38
comments (0)
In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks
(www.wsj.com)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 14 Apr 2025 06:25
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 14 Apr 2025 06:25
comments (0)
Hacktivism is back – but don't be fooled, it's often state-backed goons in masks
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 13 Apr 2025 23:29
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 13 Apr 2025 23:29
comments (0)
AMD confirms security vulnerability in every Zen 1 to Zen 5 processor
(www.tweaktown.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Apr 2025 08:12
comments (10)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Apr 2025 08:12
comments (10)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Apr 2025 06:12
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Apr 2025 06:12
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Apr 2025 06:01
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Apr 2025 06:01
comments (4)
Google fixes two Android zero-day bugs actively exploited by hackers
(techcrunch.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Apr 2025 04:53
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Apr 2025 04:53
comments (0)
How ToddyCat tried to hide behind AV software.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 07 Apr 2025 16:25
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 07 Apr 2025 16:25
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Apr 2025 15:27
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Apr 2025 15:27
comments (0)
Why OAuth MUST share access token with 3rd party?!?
in cybersecurity@infosec.pub from maltfield@lemmy.ca on 06 Apr 2025 03:43
comments (2)
in cybersecurity@infosec.pub from maltfield@lemmy.ca on 06 Apr 2025 03:43
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Apr 2025 15:16
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Apr 2025 15:16
comments (2)
Simplifying JWT Validation for Developers
in cybersecurity@infosec.pub from andyssojet@sh.itjust.works on 04 Apr 2025 11:53
comments (1)
in cybersecurity@infosec.pub from andyssojet@sh.itjust.works on 04 Apr 2025 11:53
comments (1)
Threat actors leverage tax season to deploy tax-themed phishing campaigns.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Apr 2025 21:11
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Apr 2025 21:11
comments (1)
Unknown scanners probing Juniper and Palo Alto products
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Apr 2025 19:40
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Apr 2025 19:40
comments (0)
Apple Warns of Three 0-Day Vulnerabilities Actively Exploited in Attacks
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Apr 2025 22:39
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Apr 2025 22:39
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Apr 2025 15:42
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Apr 2025 15:42
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Mar 2025 14:54
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Mar 2025 14:54
comments (1)
StealC V2 – A Major Update to a Popular Infostealer
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 31 Mar 2025 09:42
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 31 Mar 2025 09:42
comments (0)
Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job
(hackread.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 31 Mar 2025 00:31
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 31 Mar 2025 00:31
comments (0)
Malware is harder to find when written in obscure languages
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Mar 2025 04:51
comments (11)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Mar 2025 04:51
comments (11)
'Evilginx' Tool (Still) Bypasses MFA
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Mar 2025 04:49
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Mar 2025 04:49
comments (0)
China’s FamousSparrow flies back into action, breaches US org after years off the radar
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Mar 2025 21:40
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Mar 2025 21:40
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Mar 2025 13:48
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Mar 2025 13:48
comments (0)
Infosec pro Troy Hunt HasBeenPwned in Mailchimp phish
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 Mar 2025 23:02
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 Mar 2025 23:02
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Mar 2025 14:36
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Mar 2025 14:36
comments (3)
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Mar 2025 23:08
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Mar 2025 23:08
comments (0)
Experts doubt Oracle's breach denial as inside data emerges
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Mar 2025 22:43
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Mar 2025 22:43
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Mar 2025 15:34
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Mar 2025 15:34
comments (0)
Steam pulls game demo infecting Windows with info-stealing malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Mar 2025 04:30
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Mar 2025 04:30
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Mar 2025 13:37
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Mar 2025 13:37
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Mar 2025 14:33
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Mar 2025 14:33
comments (2)
New Arcane stealer spreading via YouTube and Discord.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 19 Mar 2025 11:34
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 19 Mar 2025 11:34
comments (0)
New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Mar 2025 03:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Mar 2025 03:58
comments (1)
New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support
(hackread.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 2025 06:34
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 2025 06:34
comments (1)
Critical RCE flaw in Apache Tomcat actively exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Mar 2025 05:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Mar 2025 05:12
comments (0)
Infamous ransomware hackers reveal new tool to brute-force VPNs
(www.techradar.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 2025 02:40
comments (3)
in cybersecurity@infosec.pub from tonytins@pawb.social on 18 Mar 2025 02:40
comments (3)
New MassJacker clipper targets pirated software seekers
(web.archive.org)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 2025 23:43
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 2025 23:43
comments (1)
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption.
(tinyhack.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 2025 23:05
comments (7)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 2025 23:05
comments (7)
Warning over free online file converters that actually install malware.
(www.fbi.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 2025 23:02
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 2025 23:02
comments (1)
mac.c macOS Stealer
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 17 Mar 2025 22:47
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 17 Mar 2025 22:47
comments (0)
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 2025 20:23
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 2025 20:23
comments (0)
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 2025 18:15
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 17 Mar 2025 18:15
comments (0)
Denmark warns of increased state-sponsored campaigns targeting the European telcos
(web.archive.org)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 2025 16:43
comments (2)
in cybersecurity@infosec.pub from tonytins@pawb.social on 17 Mar 2025 16:43
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Mar 2025 14:15
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Mar 2025 14:15
comments (1)
The ransomware clones of HellCat & Morpheus.
(thecyberwire.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 2025 23:28
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 2025 23:28
comments (0)
[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.
(www.bentasker.co.uk)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 2025 19:47
comments (4)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 2025 19:47
comments (4)
Thousands of healthcare records exposed online, including private patient information
(www.techradar.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 2025 19:44
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 2025 19:44
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 2025 05:02
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 2025 05:02
comments (0)
CISA: We didn't fire red teams, just unhired some of them
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 2025 23:45
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 2025 23:45
comments (2)
Ransomware Hits Record High: 126% Surge in Attacks in February 2025
(hackread.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 23:24
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 23:24
comments (0)
FreeType Zero-Day Being Exploited in the Wild
(www.securityweek.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 20:50
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 20:50
comments (0)
Windows 10 KB5053606 update fixes broken SSH connections
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 18:18
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 18:18
comments (0)
Phishing campaign impersonates Booking. com, delivers a suite of credential-stealing malware.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 2025 17:39
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 2025 17:39
comments (0)
New Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcams
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 2025 15:07
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 2025 15:07
comments (1)
DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware.
(www.tenable.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 2025 15:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 2025 15:05
comments (0)
Head Mare and Twelve: Joint attacks on Russian entities.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 2025 11:19
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 2025 11:19
comments (0)
Lazarus Group deceives developers with 6 new malicious npm packages
(cyberscoop.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 01:42
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 2025 01:42
comments (0)
Chinese snoops spotted on end-of-life Juniper routers
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 2025 19:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 2025 19:09
comments (0)
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers.
(cloud.google.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 2025 18:48
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 2025 18:48
comments (0)
Mozilla warns users to update Firefox before certificate expires
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 2025 18:45
comments (8)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 2025 18:45
comments (8)
Medusa Ransomware.
(www.cisa.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 2025 18:34
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 2025 18:34
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 2025 13:47
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 2025 13:47
comments (1)
North Korean Lazarus hackers infect hundreds via npm packages
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 2025 06:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 2025 06:58
comments (1)
Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 2025 06:44
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 2025 06:44
comments (0)
On The Insecurity of Telecom Stacks in the Wake of Salt Typhoon - Dhole Moments
(soatok.blog)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 2025 05:55
comments (0)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 2025 05:55
comments (0)
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
(techcrunch.com)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 2025 22:24
comments (8)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 2025 22:24
comments (8)
'Uber for nurses' exposes 86k+ medical records, PII.
(www.theregister.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 2025 18:59
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 2025 18:59
comments (1)
Google researchers uncover critical security flaw in all AMD Zen processors
(www.techspot.com)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 2025 05:05
comments (3)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 2025 05:05
comments (3)
The ESP32 Bluetooth Backdoor That Wasn’t
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 2025 23:53
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 2025 23:53
comments (1)
SideWinder targets the maritime and nuclear sectors with an updated toolset.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 2025 17:30
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 2025 17:30
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 2025 17:17
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 2025 17:17
comments (0)
Snopes Twitter got hacked. Twitter screws up the response
(infosec.exchange)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 2025 02:57
comments (10)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 2025 02:57
comments (10)
How to Set Up Your Online Identity on Keyoxide: A Simple Guide
(blog.epic-worlds.com)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 2025 02:29
comments (10)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 2025 02:29
comments (10)
Undocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.
(www.tarlogic.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 2025 22:06
comments (9)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 2025 22:06
comments (9)
YouTubers extorted via copyright strikes to spread malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 2025 19:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 2025 19:37
comments (0)
Undocumented backdoor found in Bluetooth chip used by a billion devices
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 2025 18:25
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 2025 18:25
comments (1)
Hacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court order
(techcrunch.com)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 2025 22:54
comments (0)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 2025 22:54
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Mar 2025 15:24
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Mar 2025 15:24
comments (2)
InvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurations
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Mar 2025 07:46
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Mar 2025 07:46
comments (0)
Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.
(hunt.io)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 20:35
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 20:35
comments (0)
Malvertising campaign leads to info stealers hosted on GitHub.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 19:11
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 19:11
comments (0)
Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.
(www.ic3.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 16:10
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 16:10
comments (0)
Unmasking the new persistent attacks on Japan.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 12:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 12:18
comments (0)
Stealers and backdoors are spreading under the guise of a DeepSeek client.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 11:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 2025 11:18
comments (0)
BADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected(backdoored) with malware that conscripts them into a botnet.
(www.humansecurity.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 17:32
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 17:32
comments (0)
Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security
(cyberscoop.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 2025 16:58
comments (2)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 2025 16:58
comments (2)
Scrolls - A "Newsletter" with some Cybersecurity stuff
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 2025 16:29
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 2025 16:29
comments (0)
I spoke to a task scammer. Here's how it went.
(www.malwarebytes.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 16:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 16:05
comments (0)
Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 12:46
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 12:46
comments (0)
Silk Typhoon targeting IT supply chain.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 12:45
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 2025 12:45
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 2025 06:44
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 2025 06:44
comments (2)
Ransomware crew threatens to leak 'stolen' Tata Tech data
(www.theregister.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 2025 05:30
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 2025 05:30
comments (0)
Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.
(www.proofpoint.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 2025 18:39
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 2025 18:39
comments (0)
Techlore video review of BusKill (Open-Source Dead Man Switch) 🔒
(www.buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 04 Mar 2025 18:29
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 04 Mar 2025 18:29
comments (0)
Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit.
(icode4.coffee)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 2025 16:10
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 2025 16:10
comments (0)
AI’s Role in Turning Massive Data Leaks into Hacker Paydays: A Look at the Orange Breach.
(www.infostealers.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 2025 13:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 2025 13:18
comments (0)
Ransomware scum abusing Microsoft Windows-signed driver
(www.theregister.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 04 Mar 2025 08:52
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 04 Mar 2025 08:52
comments (0)
Plane GPS systems are under sustained attack - is the solution a new atomic clock?
(www.bbc.com)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 03 Mar 2025 23:00
comments (0)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 03 Mar 2025 23:00
comments (0)
Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions.
(cloud.google.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 2025 16:38
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 2025 16:38
comments (0)
Uncovering .NET Malware Obfuscated by Encryption and Virtualization.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 2025 13:19
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 2025 13:19
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Mar 2025 13:18
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Mar 2025 13:18
comments (0)
The mobile threat landscape in 2024.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 2025 12:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 2025 12:05
comments (0)
This Week In Security: Malicious Themes, Crypto Heists, And Wallbleed
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Feb 2025 18:04
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Feb 2025 18:04
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Feb 2025 12:35
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Feb 2025 12:35
comments (0)
Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 27 Feb 2025 13:51
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 27 Feb 2025 13:51
comments (0)
Cross-platform, multilingual Russian operations promote pro-Kremlin content.
(dfrlab.org)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 2025 23:43
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 2025 23:43
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Feb 2025 17:50
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Feb 2025 17:50
comments (0)
RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 2025 14:43
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 2025 14:43
comments (0)
Auto-Color: An Emerging and Evasive Linux Backdoor.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 2025 21:44
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 2025 21:44
comments (0)
Your item has sold! Avoiding scams targeting online sellers.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 2025 21:40
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 2025 21:40
comments (0)
2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 2025 18:42
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 2025 18:42
comments (0)
Dylan Ayrey Has a Sleepless Night Thanks to an SSH Backdoor in Eight Sleep Smart Mattress Covers
(www.hackster.io)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 2025 18:03
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 2025 18:03
comments (0)
Selective jamming: Reconfigurable intelligent surfaces reveal new method of attacking Wi-Fi networks
(techxplore.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 2025 17:44
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 2025 17:44
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Feb 2025 15:51
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Feb 2025 15:51
comments (2)
Raymond IT Systems Hit by Cyber Attack – Investigation In progress
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Feb 2025 18:21
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Feb 2025 18:21
comments (0)
quantitative analysis tools
in cybersecurity@infosec.pub from biptoot@lemmy.today on 21 Feb 2025 21:58
comments (4)
in cybersecurity@infosec.pub from biptoot@lemmy.today on 21 Feb 2025 21:58
comments (4)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Feb 2025 06:27
comments (6)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Feb 2025 06:27
comments (6)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Feb 2025 20:55
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Feb 2025 20:55
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Feb 2025 06:40
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Feb 2025 06:40
comments (0)
How to visualize #server #metrics in #RealTime via #TCP in #LabPlot?
@labplot@lemmy.kde.social @sysadmin@lemmy.world@sysadmin@lemmy.ml
in cybersecurity@infosec.pub from LabPlot@floss.social on 18 Feb 2025 09:15
comments (0)
in cybersecurity@infosec.pub from LabPlot@floss.social on 18 Feb 2025 09:15
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Feb 2025 14:55
comments (5)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Feb 2025 14:55
comments (5)
Violet Blue: America’s unfolding cybersecurity catastrophe
(medium.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Feb 2025 05:20
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Feb 2025 05:20
comments (3)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Feb 2025 14:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Feb 2025 14:36
comments (0)
Hackers spoof Microsoft ADFS login pages to steal credentials
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Feb 2025 09:36
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Feb 2025 09:36
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Feb 2025 14:37
comments (8)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Feb 2025 14:37
comments (8)
Researcher sniffs out three-year Go supply chain attack
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Feb 2025 22:48
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Feb 2025 22:48
comments (1)
Musk’s DOGE Minions Refuse to Reveal Their Names When Grilling Civil Servants
(infosec.pub)
in cybersecurity@infosec.pub from mwguy@infosec.exchange on 04 Feb 2025 22:08
comments (0)
in cybersecurity@infosec.pub from mwguy@infosec.exchange on 04 Feb 2025 22:08
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Jan 2025 14:00
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Jan 2025 14:00
comments (2)