1
12
submitted 10 hours ago by [email protected] to c/[email protected]

CISA Adds Three Known Exploited Vulnerabilities to Catalog

2
4
submitted 10 hours ago by [email protected] to c/[email protected]

The American Radio Relay League (ARRL) warns it suffered a cyberattack, which disrupted its IT systems and online operations, including email and the Logbook of the World.

3
58
submitted 1 day ago by [email protected] to c/[email protected]

A ransomware operation targets Windows system administrators by taking out Google ads to promote fake download sites for Putty and WinSCP.

4
14
submitted 1 day ago by [email protected] to c/[email protected]

The banking trojan "Grandoreiro" is spreading in a large-scale phishing campaign in over 60 countries, targeting customer accounts of roughly 1,500 banks.

5
27
submitted 2 days ago by [email protected] to c/[email protected]

Starting in July, Microsoft will begin gradually enforcing multi-factor authentication (MFA) for all users signing into Azure to administer resources.

6
55
submitted 2 days ago by [email protected] to c/[email protected]
7
21
submitted 2 days ago by [email protected] to c/[email protected]

The Norwegian National Cyber Security Centre (NCSC) recommends replacing SSLVPN/WebVPN solutions with alternatives due to the repeated exploitation of related vulnerabilities in edge network devices to breach corporate networks.

8
17
submitted 2 days ago by [email protected] to c/[email protected]
9
11
submitted 2 days ago by [email protected] to c/[email protected]
10
11
submitted 2 days ago by [email protected] to c/[email protected]
11
7
submitted 2 days ago by [email protected] to c/[email protected]

Threat actors use phishing techniques to obtain non-public information about generative artificial intelligence.

12
62
submitted 4 days ago by [email protected] to c/[email protected]

​Google has released a new emergency Chrome security update to address the third zero-day vulnerability exploited in attacks within a week.

13
55
submitted 4 days ago by [email protected] to c/[email protected]

cross-posted from: https://lemmy.zip/post/15519717

An earlier iteration of the site was taken down last year; now its reincarnation is gone.

14
6
submitted 2 days ago by [email protected] to c/[email protected]
15
40
submitted 4 days ago by [email protected] to c/[email protected]

The company’s Patch Tuesday includes fixes for flaws in Windows Desktop Window Manager, Windows MSHTML, and Visual Studio, among others, that IT security orgs should prioritize.

16
21
submitted 3 days ago by [email protected] to c/[email protected]
17
46
submitted 4 days ago by glarf to c/[email protected]
18
32
submitted 4 days ago by [email protected] to c/[email protected]
19
28
submitted 4 days ago by [email protected] to c/[email protected]
20
27
submitted 4 days ago by [email protected] to c/[email protected]
21
25
submitted 4 days ago by [email protected] to c/[email protected]
22
114
submitted 6 days ago by [email protected] to c/[email protected]

A Korean cybersecurity expert has been sentenced to prison for illegally accessing and distributing private videos from vulnerable "wallpad" cameras in 400,000 private households.

23
32
submitted 5 days ago by [email protected] to c/[email protected]

​Microsoft has fixed a zero-day vulnerability exploited in attacks to deliver QakBot and other malware payloads on vulnerable Windows systems.

24
14
submitted 4 days ago by [email protected] to c/[email protected]

Researchers have uncovered a critical vulnerability in VMware's Bluetooth device, allowing code execution by malicious actors.

25
18
submitted 5 days ago by [email protected] to c/[email protected]

A crisis at the key US service for ranking vulnerabilities has been fueled by short resources and an explosion of security flaws as the volume of software production increases.

view more: next ›

Cybersecurity

4687 readers
91 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 11 months ago
MODERATORS