cybersecurity - cybersecurity@infosec.pub
- https://infosec.pub/c/cybersecurity
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome! Enjoy!About
Community Rules
Act now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blog
(techcommunity.microsoft.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 09 Jul 06:50
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 09 Jul 06:50
comments (0)
Git security vulnerabilities announced
(github.blog)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Jul 18:57
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 08 Jul 18:57
comments (0)
VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification
(huggingface.co)
in cybersecurity@infosec.pub from cm0002@programming.dev on 08 Jul 14:55
comments (0)
in cybersecurity@infosec.pub from cm0002@programming.dev on 08 Jul 14:55
comments (0)
Bluetooth flaws could let hackers spy through your microphone
(insinuator.net)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Jul 22:31
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Jul 22:31
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Jul 16:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 Jul 16:36
comments (0)
How the Batavia spyware targeting Russian organizations works
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Jul 16:35
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 Jul 16:35
comments (0)
Massive spike in use of .es domains for phishing abuse
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 07 Jul 08:54
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 07 Jul 08:54
comments (0)
Vulnerability Report - June 2025
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jul 07:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jul 07:58
comments (0)
Belgium is unsafe for CVD
(floort.net)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Jul 20:03
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 Jul 20:03
comments (1)
New Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Finds
(www.silentpush.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 04 Jul 05:47
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 04 Jul 05:47
comments (0)
ChatGPT creates phisher’s paradise by serving wrong URLs
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jul 17:27
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jul 17:27
comments (1)
How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets
(trufflesecurity.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 08:52
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 08:52
comments (0)
Pro-Russian hacktivism: Shifting alliances, new groups and risks
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 08:24
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 03 Jul 08:24
comments (0)
France: Chinese Hackers Exploited Ivanti Flaw Targeting Government Agencies, Telecoms, Firms In Media, Finance, Transport Sectors
(www.bankinfosecurity.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Jul 06:13
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 03 Jul 06:13
comments (0)
Pro-Iran hacktivists borrow from Russia's cyber playbook
(www.axios.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Jul 00:15
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 02 Jul 00:15
comments (0)
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@reddthat.com on 01 Jul 20:57
comments (0)
in cybersecurity@infosec.pub from Pro@reddthat.com on 01 Jul 20:57
comments (0)
US disrupts North Korean IT worker "laptop farm" scheme in 16 states
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 19:43
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 19:43
comments (1)
New FileFix attack runs JScript while bypassing Windows MoTW alerts
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 19:43
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 19:43
comments (0)
Break The Air Gap With Ultrasound
(hackaday.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 15:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 Jul 15:13
comments (0)
Hikvision Canada ordered to cease operations over security risks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jun 17:08
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 30 Jun 17:08
comments (0)
Stumbled on to StormShield - opinions?
(www.stormshield.com)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 30 Jun 16:02
comments (0)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 30 Jun 16:02
comments (0)
Qilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UK
(hackread.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 30 Jun 05:32
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 30 Jun 05:32
comments (0)
Canada orders China's Hikvision to close Canadian operations over national security concerns
(www.reuters.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Jun 14:08
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 Jun 14:08
comments (0)
Citrix Bleed 2 flaw now believed to be exploited in attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jun 05:01
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Jun 05:01
comments (0)
mommy Access Broker
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 19:39
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 19:39
comments (0)
Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraud
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 18:33
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 Jun 18:33
comments (0)
Authoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Study
(www.swp-berlin.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 27 Jun 08:21
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 27 Jun 08:21
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Jun 04:05
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 27 Jun 04:05
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jun 17:23
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 25 Jun 17:23
comments (4)
Iranian Educated Manticore Targets Leading Tech Academics
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 25 Jun 15:36
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 25 Jun 15:36
comments (0)
In the Wild: Malware Prototype with Embedded Prompt Injection
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 25 Jun 12:51
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 25 Jun 12:51
comments (0)
Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jun 23:11
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jun 23:11
comments (0)
China: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19
(www.article19.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Jun 11:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Jun 11:10
comments (0)
China-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devices
(securityscorecard.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Jun 04:58
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 24 Jun 04:58
comments (0)
⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jun 03:50
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 24 Jun 03:50
comments (0)
Canada says Chinese-backed hackers were likely behind recent malicious activity targeting domestic telecommunications infrastructure
(www.insurancejournal.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Jun 15:34
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Jun 15:34
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Jun 13:38
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Jun 13:38
comments (0)
Does the digital security equilibrium hold under AI?
(www.bsg.ox.ac.uk)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jun 10:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 Jun 10:19
comments (0)
Disinformation for beginners: How access to TikTok is threatening European security
(ecfr.eu)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 22 Jun 17:04
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 22 Jun 17:04
comments (0)
Stegano 2.0.0 released with functions to hide and reveal messages in PCM encoded .wav files
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jun 14:39
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Jun 14:39
comments (0)
Review: Learning Kali Linux, 2nd Edition
(www.helpnetsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jun 04:04
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 21 Jun 04:04
comments (0)
The Hidden Threat: How DanaBot Malware Facilitated Data Theft and Russian State-Sponsored Spying
(www.rferl.org)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Jun 04:58
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 Jun 04:58
comments (0)
Iran-Israel War Triggers a Maelstrom in Cyberspace
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 Jun 01:59
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 Jun 01:59
comments (0)
16 billion passwords leaked in one of the biggest data breaches ever: Report - Dexerto
(www.dexerto.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Jun 22:56
comments (4)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 Jun 22:56
comments (4)
Same Sea, New Phish: Russian Government-Linked Social Engineering Targets App-Specific Passwords
(citizenlab.ca)
in cybersecurity@infosec.pub from Pro@programming.dev on 19 Jun 10:56
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 19 Jun 10:56
comments (0)
North Korean hackers deepfake execs in Zoom call to spread Mac malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:32
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:32
comments (2)
New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:31
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 18 Jun 22:31
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Jun 16:21
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Jun 16:21
comments (0)
A look at ‘Tinker,’ Black Basta’s phishing fixer, negotiator
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jun 08:06
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 18 Jun 08:06
comments (0)
MDEAutomator: Open-source endpoint management, incident response in MDE
(www.helpnetsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 21:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 21:09
comments (0)
BusKill Warrant Canary 2025-2026
(www.buskill.in)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 17 Jun 19:13
comments (0)
in cybersecurity@infosec.pub from buskill@lemmy.sdf.org on 17 Jun 19:13
comments (0)
Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:58
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:58
comments (5)
Threat Actor Abuses TeamFiltration for Entra ID Account Takeovers
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 17 Jun 18:07
comments (0)
Two Factor Insecurity: How Google, Amazon, Meta and thousands of other companies leave customers vulnerable over one-time codes to save time and money
(www.lighthousereports.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 17 Jun 14:12
comments (1)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 17 Jun 14:12
comments (1)
Apple and Google Still Have a Chinese VPN Problem
(www.techtransparencyproject.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 Jun 17:10
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Jun 12:41
comments (3)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Jun 12:41
comments (3)
A JPEG With A Payload
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 16 Jun 11:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 16 Jun 11:19
comments (0)
Solar PV vulnerabilities
(www.redhotcyber.com)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 15 Jun 10:41
comments (3)
in cybersecurity@infosec.pub from Cyber@feddit.uk on 15 Jun 10:41
comments (3)
Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Jun 04:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Jun 04:52
comments (0)
GCVE-BCP-03 - Decentralized Publication Standard implemented in Vulnerability-Lookup
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Jun 09:19
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 Jun 09:19
comments (0)
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 13 Jun 00:49
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 13 Jun 00:49
comments (0)
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 16:45
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 16:45
comments (0)
The Citizen Lab: Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
(citizenlab.ca)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Jun 15:57
comments (0)
dupe: cybersecurity@infosec.pub (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 12 Jun 15:57
comments (0)
dupe: cybersecurity@infosec.pub (0)
Russian hybrid warfare: Ukraine's success offers lessons for Europe
(www.atlanticcouncil.org)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 12 Jun 07:18
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 12 Jun 07:18
comments (0)
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
(www.interpol.int)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 04:10
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 12 Jun 04:10
comments (1)
Researchers find the first known “zero-click” attack on an AI agent; the now-fixed flaw in Microsoft 365 Copilot would let a hacker attack a user via an email
(www.aim.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 18:48
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 18:48
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Jun 13:39
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 11 Jun 13:39
comments (0)
“Oral pleasure” app potentially leaks millions of messages and GPS locations
(cybernews.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:58
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:58
comments (0)
New BrowserVenom malware being distributed via fake DeepSeek phishing website
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:42
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 11 Jun 12:42
comments (0)
CISO who helped unmask Badbox warns: Version 3 is coming
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Jun 08:28
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 11 Jun 08:28
comments (0)
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability; Middle Eastern Cyber Espionage.
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 10 Jun 22:04
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 10 Jun 22:04
comments (0)
New Secure Boot flaw lets attackers install bootkit malware, patch now
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 20:59
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 20:59
comments (0)
Texas Dept. of Transportation breached, 300k crash records stolen
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:53
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:53
comments (0)
FIN6 hackers pose as job seekers to backdoor recruiters’ devices
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:36
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 16:36
comments (1)
Chinese spy crew appears to be preparing for conflict by backdooring more than 70 critical organizations worldwide
(www.theregister.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:54
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 10 Jun 05:54
comments (0)
Sensata Technologies says personal data stolen by ransomware gang
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:07
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:07
comments (0)
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:04
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 Jun 00:04
comments (1)
US infrastructure could crumble under cyberattack, ex-NSA advisor warns
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 22:11
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 22:11
comments (5)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Jun 17:28
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 Jun 17:28
comments (0)
Librarian Ghouls carry out attacks with data theft and crypto miner deployment
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 09 Jun 11:18
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 09 Jun 11:18
comments (1)
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 2025 05:04
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 Jun 2025 05:04
comments (0)
ChatGPT used to disable SecureBoot in locked-down device – modded BIOS reflash facilitated fresh Windows and Linux installs
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Jun 2025 19:21
comments (10)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 Jun 2025 19:21
comments (10)
Cybercriminals turn to “residential proxy” services to hide malicious traffic
(arstechnica.com)
in cybersecurity@infosec.pub from tonytins@pawb.social on 08 Jun 2025 12:50
comments (1)
in cybersecurity@infosec.pub from tonytins@pawb.social on 08 Jun 2025 12:50
comments (1)
Millions of low-cost Android devices turn home networks into crime platforms
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jun 2025 18:20
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 Jun 2025 18:20
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Jun 2025 14:25
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 06 Jun 2025 14:25
comments (0)
Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Jun 2025 01:58
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 Jun 2025 01:58
comments (1)
Home Internet Connected Devices Facilitate Criminal Activity
(www.ic3.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 20:38
comments (1)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 20:38
comments (1)
Evidence of Zero-Click iPhones Exploitation Uncovered in the U.S.
(iverify.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 17:58
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 17:58
comments (2)
More than a hundred backdoored malware repos traced to single GitHub user
(news.sophos.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 16:06
comments (0)
dupe: cybersecurity@infosec.pub (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 16:06
comments (0)
dupe: cybersecurity@infosec.pub (0)
Be Careful With Fake Zoom Client Downloads
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 10:40
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 05 Jun 2025 10:40
comments (0)
Vulnerability-Lookup Discourse on Mastodon!
(lemmy.ml)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 07:10
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 07:10
comments (0)
Custom Active Directory Client-Side Extensions Enable Stealthy Corporate Backdoors
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 05:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 05 Jun 2025 05:58
comments (0)
Europe leads the world in exposed solar power equipment, raising alarms on infrastructure security, report finds
(www.forescout.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 05 Jun 2025 04:38
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 05 Jun 2025 04:38
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Jun 2025 16:08
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 04 Jun 2025 16:08
comments (1)
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Jun 2025 06:18
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 04 Jun 2025 06:18
comments (0)
One-third of top U.S. cyber force has left since Trump took office
(www.axios.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 21:21
comments (4)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 21:21
comments (4)
Australia Begins New Ransomware Payment Disclosure Rules
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 21:10
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 21:10
comments (1)
Vulnerability Report - May 2025
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 06:48
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 06:48
comments (0)
Cartier discloses data breach amid fashion brand cyberattacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 05:22
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 05:22
comments (0)
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
(thehackernews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 05:20
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 05:20
comments (1)
Trump’s CISA budget lays out deep job cuts, program reductions
(www.cybersecuritydive.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 01:15
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 03 Jun 2025 01:15
comments (1)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Jun 2025 12:59
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 Jun 2025 12:59
comments (0)
Simple SSH Backdoor
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 Jun 2025 07:34
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 Jun 2025 07:34
comments (0)
AI agents outperform human teams in hacking competitions
(the-decoder.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 01 Jun 2025 14:01
comments (2)
in cybersecurity@infosec.pub from Pro@programming.dev on 01 Jun 2025 14:01
comments (2)
Spain: Number of cyberattacks against critical infrastructure rose by 43% in 2024 and are 'typically state-sponsored,' report finds
(www.prosegur.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Jun 2025 08:46
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 01 Jun 2025 08:46
comments (0)
Chinese spying on Dutch industries 'intensifying': Dutch defence minister
(www.reuters.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 31 May 2025 17:02
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 31 May 2025 17:02
comments (0)
The first day of @thotcon 0xD was a total blast! Before the presentations even got started I had the amazing Cliff Stoll sitting next to me imparting his wisdom, his jokes, and being a lot of fun! If
in cybersecurity@infosec.pub from corewarrior@infosec.exchange on 31 May 2025 02:19
comments (7)
in cybersecurity@infosec.pub from corewarrior@infosec.exchange on 31 May 2025 02:19
comments (7)
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
(www.greynoise.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 May 2025 07:13
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 29 May 2025 07:13
comments (0)
OneDrive File Picker Flaw Provides ChatGPT and Other Web Apps Full Read Access to Users’ Entire OneDrive
(www.oasis.security)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 15:23
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 15:23
comments (0)
Evolution of Zanubis, a banking Trojan for Android
(securelist.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 14:18
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 14:18
comments (0)
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
(cloud.google.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 08:22
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 28 May 2025 08:22
comments (0)
UK Envoy Urges Transatlantic Tech Alliance, Cites China Threat
(www.bloomberg.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 06:00
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 06:00
comments (0)
Dutch intelligence report says Russian hacker group stole data on 63,000 police officers, targeted NATO government systems
(theins.ru)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 05:45
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 28 May 2025 05:45
comments (0)
CISA loses nearly all top officials as purge continues
(www.cybersecuritydive.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 18:23
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 18:23
comments (3)
NIST Introduces New Metric to Measure Likelihood of Vulnerability Exploits
(www.infosecurity-magazine.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 15:50
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 27 May 2025 15:50
comments (0)
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
(www.microsoft.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 May 2025 11:06
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 27 May 2025 11:06
comments (0)
Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
(www.websiteplanet.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 16:11
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 16:11
comments (0)
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
(www.legitsecurity.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 16:11
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 26 May 2025 16:11
comments (0)
Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack
(blog.kandji.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 May 2025 12:44
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 24 May 2025 12:44
comments (0)
A local server designed to load one or more pre-trained NLP models during startup and expose them through a clean, RESTful API
(github.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 14:17
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 14:17
comments (1)
270 arrested in global dark web crackdown targeting online drug and criminal networks | Europol
(www.europol.europa.eu)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 14:01
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 May 2025 14:01
comments (0)
German Cyber Agency Sounds Warning on Grid Vulnerabilities across Europe
(www.bankinfosecurity.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 13:08
comments (2)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 13:08
comments (2)
DanaBot malware disrupted, threat actors named
(intel471.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 May 2025 06:46
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 23 May 2025 06:46
comments (0)
Denmark finds ‘suspicious’ components in key infrastructure imports, raising concerns about espionage and energy security
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 06:00
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 23 May 2025 06:00
comments (0)
Chinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report says
(gbhackers.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 22 May 2025 16:32
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 22 May 2025 16:32
comments (0)
New Variant of Crypto Confidence Scam
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 18:19
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 18:19
comments (0)
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 17:51
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 17:51
comments (0)
The US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.
(www.cisa.gov)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 16:18
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 21 May 2025 16:18
comments (0)
Dero miner spreads inside containerized Linux environments
(securelist.com)
in cybersecurity@infosec.pub from cm0002@lemmy.sdf.org on 21 May 2025 13:32
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.sdf.org on 21 May 2025 13:32
comments (1)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 May 2025 11:35
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 May 2025 11:35
comments (1)
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 May 2025 18:09
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 20 May 2025 18:09
comments (0)
RVTools hit in supply chain attack to deliver Bumblebee malware
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 15:24
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 15:24
comments (0)
All things infostealers. Week 20, 2025 – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 20 May 2025 10:54
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 20 May 2025 10:54
comments (0)
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server
(micahflee.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 01:16
comments (5)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 20 May 2025 01:16
comments (5)
Top 5 Advances in Unsupervised Learning for Cybersecurity
(rackenzik.com)
in cybersecurity@infosec.pub from Rackenzik@lemmy.sdf.org on 19 May 2025 17:09
comments (0)
in cybersecurity@infosec.pub from Rackenzik@lemmy.sdf.org on 19 May 2025 17:09
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 May 2025 13:00
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 19 May 2025 13:00
comments (0)
VMware Hacked As $150,000 Zero-Day Exploit Dropped
(www.forbes.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:59
comments (3)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:59
comments (3)
Detecting malicious Unicode
(daniel.haxx.se)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:55
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:55
comments (0)
USN-7292-1: Dropbear vulnerabilities | Ubuntu security notices | Ubuntu
(ubuntu.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:52
comments (0)
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
(www.justice.gov)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:52
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 19 May 2025 12:52
comments (0)
Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraine
(web.archive.org)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 2025 07:35
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 2025 07:35
comments (0)
Russian hackers are interested in chaos and money, says NATO cyber defense director
(news.err.ee)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 2025 06:57
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 19 May 2025 06:57
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 May 2025 12:06
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 May 2025 12:06
comments (2)
Divine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australia
(www.defenceconnect.com.au)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 May 2025 05:41
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 16 May 2025 05:41
comments (0)
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabia
(blog.eclecticiq.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 14 May 2025 13:49
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 14 May 2025 13:49
comments (0)
89 million Steam account details just got leaked, so now's a good time to change your password
(www.xda-developers.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 May 2025 13:42
comments (20)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 14 May 2025 13:42
comments (20)
Researchers discover new security vulnerability in Intel processors
(ethz.ch)
in cybersecurity@infosec.pub from Pro@programming.dev on 14 May 2025 11:09
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 14 May 2025 11:09
comments (0)
Intel data-leaking Spectre defenses scared off once again
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 13 May 2025 22:53
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.cafe on 13 May 2025 22:53
comments (0)
RSS feed for CISA KEV vulnerabilities, powered by Vulnerability-Lookup
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 2025 20:58
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 2025 20:58
comments (0)
Britain’s intelligence services see “direct connection between Russian cyber attacks and physical threats to our security"
(therecord.media)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 May 2025 16:10
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 13 May 2025 16:10
comments (0)
CISA mutes own website, shifts routine cyber alerts to Musk’s X, RSS, email • The Register
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 2025 06:21
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 13 May 2025 06:21
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 May 2025 18:54
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 12 May 2025 18:54
comments (1)
Textbook and testing giant Pearson hit by cyberattack, customer data leaked
(www.techradar.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 May 2025 18:18
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 10 May 2025 18:18
comments (2)
Nvidia RTX 5090 can crack an 8-digit passcode in just 3 hours — password cracking benchmarks show tremendous performance
(www.tomshardware.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 2025 21:15
comments (9)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 2025 21:15
comments (9)
Supply chain attack hits npm package with 45,000 weekly downloads
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 2025 14:51
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 2025 14:51
comments (2)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 May 2025 12:57
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 09 May 2025 12:57
comments (0)
Kickidler employee monitoring software abused in ransomware attacks
(www.bleepingcomputer.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 2025 01:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 09 May 2025 01:12
comments (0)
DOGE software engineer’s computer infected by info-stealing malware
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 2025 22:02
comments (13)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 2025 22:02
comments (13)
Operation PowerOFF Takes Down 9 DDoS Domains
(www.darkreading.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 2025 19:09
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 08 May 2025 19:09
comments (0)
UK under assault as number of ‘significant’ cyberattacks doubles: Foreign powers, ransomware gangs, AI threats drive surge in incidents affecting private businesses and government systems
(www.thetimes.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 08 May 2025 11:39
comments (0)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 08 May 2025 11:39
comments (0)
Backdoor found in popular ecommerce components
(sansec.io)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 2025 16:57
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 2025 16:57
comments (0)
Vulnerability-Lookup 2.9.0 - MITRE EMB3D, GCVE
(www.vulnerability-lookup.org)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 May 2025 15:23
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 07 May 2025 15:23
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 May 2025 15:11
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 07 May 2025 15:11
comments (1)
Return of the Crypto Inferno Drainer
(research.checkpoint.com)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 2025 10:48
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 07 May 2025 10:48
comments (0)
Italy: New decree prioritizes NATO countries in public tenders, sidelining Chinese and Russian tech suppliers in a bid to enhance national security
(decode39.com)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 06 May 2025 14:33
comments (0)
in cybersecurity@infosec.pub from Hotznplotzn@lemmy.sdf.org on 06 May 2025 14:33
comments (0)
Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 May 2025 14:13
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 06 May 2025 14:13
comments (0)
Basic analysis of Kidflix users’ passwords – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 06 May 2025 10:26
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 06 May 2025 10:26
comments (0)
China has found its assassin’s mace: high-altitude electromagnetic pulse (HEMP) weapons
(www.taipeitimes.com)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 May 2025 09:03
comments (1)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 06 May 2025 09:03
comments (1)
"Mirai" Now Exploits Samsung MagicINFO CMS (CVE-2024-7399)
(isc.sans.edu)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 May 2025 08:04
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 06 May 2025 08:04
comments (0)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 May 2025 14:09
comments (1)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 05 May 2025 14:09
comments (1)
All things infostealers. Week 18, 2025 – Kinda Blog by CryptoLek
(cryptolek.info)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 05 May 2025 06:16
comments (0)
in cybersecurity@infosec.pub from CryptoLek@infosec.pub on 05 May 2025 06:16
comments (0)
How NSA Can Spy on Air-Gapped Networks? Meet FIREWALK
(www.youtube.com)
in cybersecurity@infosec.pub from kugmo@sh.itjust.works on 02 May 2025 17:30
comments (0)
in cybersecurity@infosec.pub from kugmo@sh.itjust.works on 02 May 2025 17:30
comments (0)
Disney Slack hacker was Californian, not Russian
(go.theregister.com)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 02 May 2025 17:06
comments (0)
in cybersecurity@infosec.pub from PhilipTheBucket@ponder.cat on 02 May 2025 17:06
comments (0)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 May 2025 12:28
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 02 May 2025 12:28
comments (4)
A Flaw With the Security Level Slider in Tor Browser
(www.privacyguides.org)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 May 2025 12:16
comments (0)
in cybersecurity@infosec.pub from Pro@programming.dev on 02 May 2025 12:16
comments (0)
🚨 April 2025 Vulnerability Report is out! 🚨
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 2025 14:27
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 2025 14:27
comments (0)
Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition
(cybersecuritynews.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 2025 06:02
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 01 May 2025 06:02
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Apr 2025 05:00
comments (2)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 30 Apr 2025 05:00
comments (2)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Apr 2025 13:47
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 28 Apr 2025 13:47
comments (0)
A Python client for the Global CVE Allocation System.
(github.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Apr 2025 08:06
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 28 Apr 2025 08:06
comments (0)
Chinese hackers undertaking global infiltration campaign across 12 countries and 20 industries
(teamt5.org)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Apr 2025 17:05
comments (1)
in cybersecurity@infosec.pub from randomname@scribe.disroot.org on 23 Apr 2025 17:05
comments (1)
America's cyber defenses are being dismantled from the inside
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Apr 2025 14:25
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 23 Apr 2025 14:25
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Apr 2025 12:56
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 23 Apr 2025 12:56
comments (0)
AI models can generate exploit code at lightning speed
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Apr 2025 02:34
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 22 Apr 2025 02:34
comments (6)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Apr 2025 13:36
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 21 Apr 2025 13:36
comments (0)
What are your methods to harden *nix servers?
in cybersecurity@infosec.pub from fishynoob@infosec.pub on 19 Apr 2025 05:42
comments (8)
in cybersecurity@infosec.pub from fishynoob@infosec.pub on 19 Apr 2025 05:42
comments (8)
Off-Topic Friday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Apr 2025 14:33
comments (4)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 18 Apr 2025 14:33
comments (4)
GCVE: Global CVE Allocation System
(gcve.eu)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 18:57
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 18:57
comments (0)
ActiveX blocked by default in Microsoft 365 because remote code execution is bad, OK?
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 15:45
comments (2)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 15:45
comments (2)
Researchers claim breakthrough in fight against AI’s frustrating security hole
(arstechnica.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 15:30
comments (1)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 15:30
comments (1)
Renewed Russian Phishing Campaign Against European Diplomats
(research.checkpoint.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 16 Apr 2025 14:36
comments (0)
in cybersecurity@infosec.pub from Tea@programming.dev on 16 Apr 2025 14:36
comments (0)
What are You Working on Wednesday
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Apr 2025 04:08
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 16 Apr 2025 04:08
comments (0)
The CVE program for tracking security flaws is about to lose federal funding
(www.theverge.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 02:54
comments (6)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 16 Apr 2025 02:54
comments (6)
MITRE funding for the Common Vulnerabilities and Exposures (CVE) program will expire on April 16th
(infosec.exchange)
in cybersecurity@infosec.pub from CyberSeeker@discuss.tchncs.de on 15 Apr 2025 22:50
comments (1)
in cybersecurity@infosec.pub from CyberSeeker@discuss.tchncs.de on 15 Apr 2025 22:50
comments (1)
Landmark Admin now says info on 1.6M people stolen from it
(www.theregister.com)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Apr 2025 22:12
comments (0)
in cybersecurity@infosec.pub from cm0002@lemmy.world on 15 Apr 2025 22:12
comments (0)
Threat actors misuse Node.js to deliver malware and other malicious payloads
(www.microsoft.com)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Apr 2025 20:45
comments (1)
in cybersecurity@infosec.pub from Tea@programming.dev on 15 Apr 2025 20:45
comments (1)
4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War
(www.404media.co)
in cybersecurity@infosec.pub from Deebster@infosec.pub on 15 Apr 2025 17:50
comments (11)
in cybersecurity@infosec.pub from Deebster@infosec.pub on 15 Apr 2025 17:50
comments (11)
Mentorship Monday - Discussions for career and learning!
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Apr 2025 12:38
comments (0)
in cybersecurity@infosec.pub from shellsharks@infosec.pub on 14 Apr 2025 12:38
comments (0)