cybersecurity - cybersecurity@infosec.pub
- https://infosec.pub/c/cybersecurity
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome! Enjoy!About
Community Rules
The ransomware clones of HellCat & Morpheus.
(thecyberwire.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 22:28
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 22:28
comments (0)
[Social Engineering] My Scammer Girlfriend: Baiting A Romance Fraudster.
(www.bentasker.co.uk)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 18:47
comments (3)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Mar 18:47
comments (3)
Thousands of healthcare records exposed online, including private patient information
(www.techradar.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 18:44
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 15 Mar 18:44
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 04:02
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Mar 04:02
comments (0)
CISA: We didn't fire red teams, just unhired some of them
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 22:45
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 22:45
comments (2)
Ransomware Hits Record High: 126% Surge in Attacks in February 2025
(hackread.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 22:24
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 22:24
comments (0)
FreeType Zero-Day Being Exploited in the Wild
(www.securityweek.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 19:50
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 19:50
comments (0)
Windows 10 KB5053606 update fixes broken SSH connections
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 17:18
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 17:18
comments (0)
Phishing campaign impersonates Booking. com, delivers a suite of credential-stealing malware.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 16:39
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 16:39
comments (0)
New Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcams
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 14:07
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Mar 14:07
comments (1)
DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware.
(www.tenable.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 14:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 14:05
comments (0)
Head Mare and Twelve: Joint attacks on Russian entities.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 10:19
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 13 Mar 10:19
comments (0)
Lazarus Group deceives developers with 6 new malicious npm packages
(cyberscoop.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 00:42
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 13 Mar 00:42
comments (0)
Chinese snoops spotted on end-of-life Juniper routers
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 18:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 18:09
comments (0)
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers.
(cloud.google.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:48
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:48
comments (0)
Mozilla warns users to update Firefox before certificate expires
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 17:45
comments (8)
in cybersecurity@infosec.pub from tonytins@pawb.social on 12 Mar 17:45
comments (8)
Medusa Ransomware.
(www.cisa.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:34
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 12 Mar 17:34
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 12:47
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Mar 12:47
comments (1)
North Korean Lazarus hackers infect hundreds via npm packages
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:58
comments (1)
Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:44
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Mar 05:44
comments (0)
On The Insecurity of Telecom Stacks in the Wake of Salt Typhoon - Dhole Moments
(soatok.blog)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 04:55
comments (0)
in cybersecurity@infosec.pub from Soatok@pawb.social on 12 Mar 04:55
comments (0)
DOGE axes CISA ‘red team’ staffers amid ongoing federal cuts | TechCrunch
(techcrunch.com)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 21:24
comments (8)
in cybersecurity@infosec.pub from aramova@infosec.pub on 11 Mar 21:24
comments (8)
'Uber for nurses' exposes 86k+ medical records, PII.
(www.theregister.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 17:59
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 11 Mar 17:59
comments (1)
Google researchers uncover critical security flaw in all AMD Zen processors
(www.techspot.com)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 04:05
comments (3)
in cybersecurity@infosec.pub from floofloof@lemmy.ca on 11 Mar 04:05
comments (3)
The ESP32 Bluetooth Backdoor That Wasn’t
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 22:53
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Mar 22:53
comments (1)
SideWinder targets the maritime and nuclear sectors with an updated toolset.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 16:30
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 10 Mar 16:30
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 16:17
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Mar 16:17
comments (0)
Snopes Twitter got hacked. Twitter screws up the response
(infosec.exchange)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:57
comments (10)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:57
comments (10)
How to Set Up Your Online Identity on Keyoxide: A Simple Guide
(blog.epic-worlds.com)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:29
comments (8)
in cybersecurity@infosec.pub from itwasntme223@infosec.pub on 10 Mar 01:29
comments (8)
Undocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.
(www.tarlogic.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 21:06
comments (9)
in cybersecurity@infosec.pub from Tea@programming.dev on 08 Mar 21:06
comments (9)
YouTubers extorted via copyright strikes to spread malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 18:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 18:37
comments (0)
Undocumented backdoor found in Bluetooth chip used by a billion devices
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 17:25
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Mar 17:25
comments (1)
Hacked health firm HCRG demanded journalist 'take down' data breach reporting, citing UK court order
(techcrunch.com)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 21:54
comments (0)
in cybersecurity@infosec.pub from Fitik@fedia.io on 07 Mar 21:54
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Mar 14:24
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Mar 14:24
comments (2)
InvokeADCheck - Powershell Based Tool to Detect Active Directory Misconfigurations
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Mar 06:46
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Mar 06:46
comments (0)
Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2.
(hunt.io)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 19:35
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 19:35
comments (0)
Malvertising campaign leads to info stealers hosted on GitHub.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 18:11
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 18:11
comments (0)
Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe.
(www.ic3.gov)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 15:10
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 15:10
comments (0)
Unmasking the new persistent attacks on Japan.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 11:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 11:18
comments (0)
Stealers and backdoors are spreading under the guise of a DeepSeek client.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 10:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 06 Mar 10:18
comments (0)
BADBOX 2.0 Targets Consumer Devices: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected(backdoored) with malware that conscripts them into a botnet.
(www.humansecurity.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 16:32
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 16:32
comments (0)
Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security
(cyberscoop.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 15:58
comments (2)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 15:58
comments (2)
Scrolls - A "Newsletter" with some Cybersecurity stuff
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 15:29
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 15:29
comments (0)
I spoke to a task scammer. Here's how it went.
(www.malwarebytes.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 15:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 15:05
comments (0)
Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 11:46
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 11:46
comments (0)
Silk Typhoon targeting IT supply chain.
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 11:45
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 05 Mar 11:45
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 05:44
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Mar 05:44
comments (2)
Ransomware crew threatens to leak 'stolen' Tata Tech data
(www.theregister.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 04:30
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 05 Mar 04:30
comments (0)
Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware.
(www.proofpoint.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 17:39
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 17:39
comments (0)
Techlore video review of BusKill (Open-Source Dead Man Switch) 🔒
(www.buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 04 Mar 17:29
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 04 Mar 17:29
comments (0)
Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit.
(icode4.coffee)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 15:10
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 15:10
comments (0)
AI’s Role in Turning Massive Data Leaks into Hacker Paydays: A Look at the Orange Breach.
(www.infostealers.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 12:18
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 04 Mar 12:18
comments (0)
Ransomware scum abusing Microsoft Windows-signed driver
(www.theregister.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 04 Mar 07:52
comments (0)
in cybersecurity@infosec.pub from tonytins@pawb.social on 04 Mar 07:52
comments (0)
Plane GPS systems are under sustained attack - is the solution a new atomic clock?
(www.bbc.com)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 03 Mar 22:00
comments (0)
in cybersecurity@infosec.pub from otters_raft@lemmy.ca on 03 Mar 22:00
comments (0)
Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions.
(cloud.google.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 15:38
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 15:38
comments (0)
Uncovering .NET Malware Obfuscated by Encryption and Virtualization.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 12:19
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 12:19
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Mar 12:18
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Mar 12:18
comments (0)
The mobile threat landscape in 2024.
(securelist.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 11:05
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 03 Mar 11:05
comments (0)
This Week In Security: Malicious Themes, Crypto Heists, And Wallbleed
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Feb 17:04
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Feb 17:04
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Feb 11:35
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Feb 11:35
comments (0)
Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 27 Feb 12:51
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 27 Feb 12:51
comments (0)
Cross-platform, multilingual Russian operations promote pro-Kremlin content.
(dfrlab.org)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 22:43
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 22:43
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Feb 16:50
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 26 Feb 16:50
comments (0)
RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 13:43
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 26 Feb 13:43
comments (0)
Auto-Color: An Emerging and Evasive Linux Backdoor.
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 20:44
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 20:44
comments (0)
Your item has sold! Avoiding scams targeting online sellers.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 20:40
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 25 Feb 20:40
comments (0)
2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 17:42
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 17:42
comments (0)
Dylan Ayrey Has a Sleepless Night Thanks to an SSH Backdoor in Eight Sleep Smart Mattress Covers
(www.hackster.io)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 17:03
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 17:03
comments (0)
Selective jamming: Reconfigurable intelligent surfaces reveal new method of attacking Wi-Fi networks
(techxplore.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 16:44
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Feb 16:44
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Feb 14:51
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Feb 14:51
comments (2)
Raymond IT Systems Hit by Cyber Attack – Investigation In progress
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Feb 17:21
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Feb 17:21
comments (0)
quantitative analysis tools
in cybersecurity@infosec.pub from biptoot@lemmy.today on 21 Feb 20:58
comments (4)
in cybersecurity@infosec.pub from biptoot@lemmy.today on 21 Feb 20:58
comments (4)
[Report] OpenAI says it found evidence of an AI-powered surveillance tool used by a Chinese security operation to identify anti-China posts on social media in the West.
(openai.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 21 Feb 20:20
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 21 Feb 20:20
comments (0)
DeceptiveDevelopment targets freelance developers.
(www.welivesecurity.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 21 Feb 19:07
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 21 Feb 19:07
comments (0)
New wave of targeted attacks of the Angry Likho APT on Russian organizations.
(securelist.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 21 Feb 10:29
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 21 Feb 10:29
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Feb 05:27
comments (6)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Feb 05:27
comments (6)
Weathering the storm: In the midst of a Typhoon.
(blog.talosintelligence.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 20 Feb 15:22
comments (1)
in cybersecurity@infosec.pub from Cat@ponder.cat on 20 Feb 15:22
comments (1)
Ghost (Cring) Ransomware.
(www.cisa.gov)
in cybersecurity@infosec.pub from Cat@ponder.cat on 19 Feb 19:34
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 19 Feb 19:34
comments (0)
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger.
(cloud.google.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 19 Feb 12:50
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 19 Feb 12:50
comments (0)
How Phished Data Turns into Apple & Google Wallets.
(krebsonsecurity.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 19 Feb 08:32
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 19 Feb 08:32
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Feb 05:40
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 Feb 05:40
comments (0)
StaryDobry campaign targets gamers with XMRig miner.
(securelist.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 18 Feb 11:20
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 18 Feb 11:20
comments (0)
How to visualize #server #metrics in #RealTime via #TCP in @LabPlot ?
(cdn.masto.host)
in cybersecurity@infosec.pub from LabPlot@floss.social on 18 Feb 08:15
comments (0)
in cybersecurity@infosec.pub from LabPlot@floss.social on 18 Feb 08:15
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Feb 13:55
comments (5)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 17 Feb 13:55
comments (5)
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 Feb 07:39
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 Feb 07:39
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Feb 05:03
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Feb 05:03
comments (0)
The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.
(www.microsoft.com)
in cybersecurity@infosec.pub from Cat@ponder.cat on 13 Feb 2025 19:00
comments (0)
in cybersecurity@infosec.pub from Cat@ponder.cat on 13 Feb 2025 19:00
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Feb 2025 19:55
comments (5)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 Feb 2025 19:55
comments (5)
CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.
(www.cisa.gov)
in cybersecurity@infosec.pub from Cat@ponder.cat on 12 Feb 2025 18:44
comments (2)
in cybersecurity@infosec.pub from Cat@ponder.cat on 12 Feb 2025 18:44
comments (2)
USB Army Knife – A Powerful Red Team Tool for Penetration Testers
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Feb 2025 02:35
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Feb 2025 02:35
comments (2)
Over 12,000 KerioControl firewalls exposed to exploited RCE flaw
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Feb 2025 15:37
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Feb 2025 15:37
comments (1)
Seven Years Old Linux Kernel Vulnerability Let Attackers Execute Remote Code
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Feb 2025 15:24
comments (4)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Feb 2025 15:24
comments (4)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Feb 2025 14:39
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Feb 2025 14:39
comments (0)
Violet Blue: America’s unfolding cybersecurity catastrophe
(medium.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Feb 2025 04:20
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Feb 2025 04:20
comments (3)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Feb 2025 13:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Feb 2025 13:36
comments (0)
Hackers spoof Microsoft ADFS login pages to steal credentials
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Feb 2025 08:36
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Feb 2025 08:36
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Feb 2025 13:37
comments (8)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 Feb 2025 13:37
comments (8)
Researcher sniffs out three-year Go supply chain attack
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Feb 2025 21:48
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Feb 2025 21:48
comments (1)
Musk’s DOGE Minions Refuse to Reveal Their Names When Grilling Civil Servants
in cybersecurity@infosec.pub from mwguy@infosec.exchange on 04 Feb 2025 21:08
comments (0)
in cybersecurity@infosec.pub from mwguy@infosec.exchange on 04 Feb 2025 21:08
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Jan 2025 13:00
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 31 Jan 2025 13:00
comments (2)
Google takes action to counter G.co phishing abuse
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 Jan 2025 18:29
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 Jan 2025 18:29
comments (0)
RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jan 2025 04:03
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 25 Jan 2025 04:03
comments (0)
New Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detection
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jan 2025 15:02
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jan 2025 15:02
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Jan 2025 12:57
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 24 Jan 2025 12:57
comments (1)
Stratoshark: Wireshark for the cloud - now available! - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 23 Jan 2025 23:24
comments (1)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 23 Jan 2025 23:24
comments (1)
Asus lets processor security fix slip out early, AMD confirms patch in progress
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 18:27
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 18:27
comments (0)
Supply chain attack strikes array of Chrome Extensions
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 04:08
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Jan 2025 04:08
comments (3)
MasterCard DNS Error Went Unnoticed for Years
(krebsonsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 21:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 21:07
comments (0)
Microsoft research finds Microsoft AI products may never be secure
(pivot-to-ai.com)
in cybersecurity@infosec.pub from MajorHavoc@programming.dev on 22 Jan 2025 17:57
comments (2)
in cybersecurity@infosec.pub from MajorHavoc@programming.dev on 22 Jan 2025 17:57
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Jan 2025 14:02
comments (5)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 22 Jan 2025 14:02
comments (5)
Pumakit – A Sophisticated Linux Rootkit Attack Critical Infrastructure
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 06:37
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jan 2025 06:37
comments (0)
Botnet Unleashes Record-Breaking 5.6Tbps DDoS Attack
(www.pcmag.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jan 2025 21:42
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jan 2025 21:42
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Jan 2025 12:30
comments (7)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Jan 2025 12:30
comments (7)
Investigating USB-to-Ethernet Dongles With “Malware” Claims
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jan 2025 21:35
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jan 2025 21:35
comments (3)
BusKill (Dead Man Switch) Warrant Canary for 2025 H1
(buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 14 Jan 2025 19:19
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 14 Jan 2025 19:19
comments (0)
New HHS nondiscrimination guidelines on AI use in Healthcare
in cybersecurity@infosec.pub from boatswain@infosec.pub on 13 Jan 2025 21:53
comments (3)
in cybersecurity@infosec.pub from boatswain@infosec.pub on 13 Jan 2025 21:53
comments (3)
38C3 - We've not been trained for this: life after the Newag DRM disclosure [Stream archive; Youtube]
(www.youtube.com)
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 13 Jan 2025 19:47
comments (1)
in cybersecurity@infosec.pub from taaz@biglemmowski.win on 13 Jan 2025 19:47
comments (1)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Jan 2025 16:34
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 10 Jan 2025 16:34
comments (2)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 08 Jan 2025 17:28
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 08 Jan 2025 17:28
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Jan 2025 14:43
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 03 Jan 2025 14:43
comments (0)
🎶 For Secured Times Gone By 🎶
in cybersecurity@infosec.pub from coolboole@infosec.pub on 31 Dec 2024 19:03
comments (0)
in cybersecurity@infosec.pub from coolboole@infosec.pub on 31 Dec 2024 19:03
comments (0)
Integrating Wazuh with DefectDojo for DevSecOps
(wazuh.com)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 25 Dec 2024 18:09
comments (0)
in cybersecurity@infosec.pub from MajorTom@programming.dev on 25 Dec 2024 18:09
comments (0)
Cloud Atlas using a new backdoor, VBCloud, to steal data
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 19:40
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 19:40
comments (0)
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces
(news.sophos.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 17:13
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 17:13
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Dec 2024 14:09
comments (6)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Dec 2024 14:09
comments (6)
The Fraudster Glossary
(fraudsterglossary.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 13:11
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 13:11
comments (0)
DigiEver Fix That IoT Thing!
(www.akamai.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 10:46
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 23 Dec 2024 10:46
comments (1)
Development Platform Builder.ai Exposed Over 1.2 TB of Data Containing More Than 3 Million Records
(www.websiteplanet.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Dec 2024 10:42
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 22 Dec 2024 10:42
comments (0)
Kaspersky discovers C++ version of BellaCiao malware
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 21:22
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 21:22
comments (1)
United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 17:12
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 17:12
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Dec 2024 13:48
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 20 Dec 2024 13:48
comments (2)
Lazarus targets nuclear-related organization with new malware
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 13:10
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 13:10
comments (0)
Deobfuscation of Lumma Stealer
(ryan-weil.github.io)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 08:23
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 08:23
comments (0)
Romanian National Sentenced to 20 Years in Prison in Connection with NetWalker Ransomware Attacks Resulting in the Payment of Millions of Dollars in Ransoms
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 00:22
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 20 Dec 2024 00:22
comments (0)
I’m Lovin’ It: Exploiting McDonald’s APIs to hijack deliveries and order food for a penny
(eaton-works.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 22:20
comments (3)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 22:20
comments (3)
Python-Based NodeStealer Version Targets Facebook Ads Manager
(www.trendmicro.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 10:01
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 10:01
comments (0)
BADBOX Botnet Is Back
(www.bitsight.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 09:51
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 19 Dec 2024 09:51
comments (0)
Effective Phishing Campaign Targeting European Companies and Institutions
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:51
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:51
comments (0)
C.A.S hacktivists attack Russian organizations using rare RATs
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:39
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 21:39
comments (1)
New I2PRAT communicates via anonymous peer-to-peer network
(www.gdatasoftware.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 12:24
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 18 Dec 2024 12:24
comments (0)
Analyzing FLUX#CONSOLE: Using Tax-Themed Lures, Threat Actors Exploit Windows Management Console to Deliver Backdoor Payloads
(www.securonix.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 16:43
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 16:43
comments (1)
The Mamont banker masquerades as an app for tracking bulk purchases
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 16:35
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 16:35
comments (0)
Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs
(www.proofpoint.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 13:03
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 13:03
comments (0)
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks
(www.trendmicro.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 09:06
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 09:06
comments (0)
FBI: Watch Out For HiatusRAT Actors Hitting Webcams, DVRs
(www.vulnu.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 08:29
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 17 Dec 2024 08:29
comments (0)
CoinLurker: The Stealer Powering the Next Generation of Fake Updates
(blog.morphisec.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 21:20
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 21:20
comments (0)
Security ProbLLMs in xAI's Grok: A Deep Dive
(embracethered.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 21:17
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 21:17
comments (0)
Russia as a threat actor in the UK
(www.cyfirma.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 15:50
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 15:50
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Dec 2024 14:16
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Dec 2024 14:16
comments (0)
Malicious ad distributes SocGholish malware to Kaiser Permanente employees
(www.malwarebytes.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 14:08
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 14:08
comments (0)
How Threat Actors Exploit Brand Collaborations to Target Popular YouTube Channels
(www.cloudsek.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 10:58
comments (2)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 10:58
comments (2)
The Insecure IoT Cloud Strikes Again: RCE on Ruijie Cloud-Connected Devices
(claroty.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 08:41
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 16 Dec 2024 08:41
comments (0)
Glutton: A New Zero-Detection PHP Backdoor from Winnti Targets Cybercrimals
(blog.xlab.qianxin.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 15 Dec 2024 19:14
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 15 Dec 2024 19:14
comments (0)
Malware warning on my phone (mirai-gx)
in cybersecurity@infosec.pub from joulethief@discuss.tchncs.de on 15 Dec 2024 10:10
comments (9)
in cybersecurity@infosec.pub from joulethief@discuss.tchncs.de on 15 Dec 2024 10:10
comments (9)
Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials
(securitylabs.datadoghq.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 15 Dec 2024 05:48
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 15 Dec 2024 05:48
comments (0)
Under the SADBRIDGE with GOSAR: QUASAR Gets a Golang Rewrite
(www.elastic.co)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 14 Dec 2024 15:31
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 14 Dec 2024 15:31
comments (0)
NodeLoader Exposed: The Node.js Malware Evading Detection
(www.zscaler.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 14 Dec 2024 10:58
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 14 Dec 2024 10:58
comments (1)
Crypted Hearts: Exposing the HeartCrypt Packer-as-a-Service Operation
(unit42.paloaltonetworks.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 14 Dec 2024 01:38
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 14 Dec 2024 01:38
comments (1)
Google Advertising Out to Lunch? Simple Pivots Catch an Ongoing Malvertising Campaign Hiding in Plain Sight
(www.silentpush.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 22:39
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 22:39
comments (1)
Breaking the Air Gap Through Hardware Implants
(www.praetorian.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 22:34
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 22:34
comments (0)
Eyecare & Healthtech Company Exposed Almost 5 Million Medical Records
(www.vpnmentor.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 19:07
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 19:07
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Dec 2024 16:19
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 13 Dec 2024 16:19
comments (0)
Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
(www.trendmicro.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 08:59
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 13 Dec 2024 08:59
comments (0)
New IT Support in Town
(research.kudelskisecurity.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 23:47
comments (2)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 23:47
comments (2)
Inside a New OT/IoT Cyberweapon: IOCONTROL
(claroty.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 23:45
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 23:45
comments (0)
Rydox Cybercrime Marketplace Shut Down and Three Administrators Arrested
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 21:34
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 21:34
comments (0)
The Stealthy Stalker: Remcos RAT
(www.mcafee.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 18:51
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 18:51
comments (0)
Declawing PUMAKIT
(www.elastic.co)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 18:23
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 18:23
comments (0)
Lookout Discovers PlainGnome and Bonespy Russian Android spyware
(www.lookout.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 16:58
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 16:58
comments (0)
Unauthorized access to iCloud: analyzing an iOS vulnerability that could expose sensitive data to attackers
(www.jamf.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 14:32
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 14:32
comments (0)
Japanese publisher Kadokawa paid $3 million to Russia-linked hacker group after cyberattack
(mainichi.jp)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 13:41
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 13:41
comments (0)
Hacktivist Alliances Target France Amidst Political Crisis
(cyble.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 12:54
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 12:54
comments (0)
Attack Exploiting Legitimate Service by APT-C-60
(blogs.jpcert.or.jp)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 12:35
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 12:35
comments (0)
Careto APT’s recent attacks discovered
(securelist.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 12:06
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 12:06
comments (0)
Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprise
(www.microsoft.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 10:23
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 10:23
comments (0)
Messenger Group Call DoS for iOS
(s11research.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 10:12
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 10:12
comments (0)
BadRAM: Breaching Processor Security via Rogue Memory Modules
(badram.eu)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 10:07
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 12 Dec 2024 10:07
comments (0)
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
(www.microsoft.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:57
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:57
comments (0)
Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation
(www.akamai.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:44
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:44
comments (0)
Oasis Security Research Team Discovers Microsoft Azure MFA Bypass
(www.oasis.security)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:29
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:29
comments (0)
Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE - Smishing Triad in Action
(www.resecurity.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:25
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 18:25
comments (0)
Trust Hijacked: The Subtle Art of Phishing Through Familiar Facades
(www.group-ib.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 17:38
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 17:38
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Dec 2024 16:42
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Dec 2024 16:42
comments (0)
Lookout Discovers New Chinese Surveillance Tool Used by Public Security
(www.lookout.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 16:38
comments (1)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 16:38
comments (1)
Likely China-based Attackers Target High-profile Organizations in Southeast Asia
(www.security.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 15:50
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 15:50
comments (0)
Analysis of Nova: A Snake Keylogger Fork
(any.run)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 13:14
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 13:14
comments (0)
Law enforcement shuts down 27 DDoS booters ahead of annual Christmas attacks
(www.europol.europa.eu)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 12:47
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 12:47
comments (0)
Silent Push Unwraps the AIZ—Aggressive Inventory Zombies—Retail & Crypto Phishing Network Campaign
(www.silentpush.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 10:22
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 10:22
comments (0)
Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels
(www.sentinelone.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 09:31
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 09:31
comments (0)
From PoC to Attacker Interest in Hours: Real-Time Insights into Mitel MiCollab Vulnerabilities
(www.greynoise.io)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 09:30
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 09:30
comments (0)
Holiday Season Cyber Threats (Part 2): Ransomware, Gift Cards, and Point-of-Sale breaches
(intel471.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 00:13
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 11 Dec 2024 00:13
comments (0)
China-Based Hacker Charged for Conspiring to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwide
(www.justice.gov)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 22:15
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 22:15
comments (0)
China’s Propaganda Expansion: Inside the Rise of International Communication Centers (ICCs)
(www.recordedfuture.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 20:36
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 20:36
comments (0)
Threat Actors Exploit Flaw in Cleo File Transfer Tools ‘En Masse’
(www.vulnu.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 20:33
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 20:33
comments (0)
AppLite: A New AntiDot Variant Targeting Mobile Employee Devices
(www.zimperium.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 17:04
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 17:04
comments (0)
Head Mare Intensifies Attacks On Russia With PhantomCore
(cyble.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 16:58
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 16:58
comments (0)
Manufacturing Companies Targeted with New Lumma Campaign
(any.run)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 15:27
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 15:27
comments (0)
From Vulnerabilities to Breaches: The Shiny Nemesis Cyber Operation
(www.vpnmentor.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 08:54
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 10 Dec 2024 08:54
comments (0)
Black Basta Ransomware Campaign Drops Zbot, DarkGate, & Custom Malware
(www.rapid7.com)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 09 Dec 2024 21:52
comments (0)
in cybersecurity@infosec.pub from Joker@sh.itjust.works on 09 Dec 2024 21:52
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Dec 2024 13:34
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Dec 2024 13:34
comments (0)