home
-
all
|
technology
-
selfhosted
-
world
-
nostupidquestions
-
mildlyinfuriating
-
youshouldknow
-
games
-
showerthoughts
-
lemmyworld
-
fediverse
-
android
-
asklemmy
-
more »
log in
or
sign up
|
settings
[email protected]
hot
active
scaled
controversial
old
new
most comments
new comments
top
show images
[+]
[–]
Infosec News
113 readers
111 users here now
A community posting Cybersecurity related articles.
founded 1 week ago
MODERATORS
[email protected]
sv1sjp
listing:
all
-
local
126
5
Alabama Man Arrested for SEC Account Takeover that Manipulated Bitcoin Prices
(thecyberexpress.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
127
1
Chromium: CVE-2024-9965 Insufficient data validation in DevTools
(msrc.microsoft.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
128
-1
UNC4393 Goes Gently into the SILENTNIGHT
(cloud.google.com)
submitted
1 day ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
129
6
Microsoft creates fake Azure tenants to pull phishers into honeypots
(www.bleepingcomputer.com)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
130
2
A Measure of Motive: How Attackers Weaponize Digital Analytics Tools
(cloud.google.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
131
12
Europe launches ‘gait recognition’ pilot program to monitor border crossings
(therecord.media)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
4 comments
fedilink
132
1
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
(thehackernews.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
133
19
North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data
(thehackernews.com)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
134
4
Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media
(www.trustwave.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
135
1
I Spy With My Little Eye: Uncovering an Iranian Counterintelligence Operation
(cloud.google.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
136
7
U.S. Indicts 2 Top Russian Hackers, Sanctions Cryptex
(krebsonsecurity.com)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
137
1
Beyond the wail: deconstructing the BANSHEE infostealer
(www.elastic.co)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
138
1
Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRAT Linux and MacOS Backdoors
(unit42.paloaltonetworks.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
139
7
File hosting services misused for identity phishing
(www.microsoft.com)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
140
8
U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign
(thehackernews.com)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
141
1
Inaugural World Tour 2024 Survey Findings
(www.trendmicro.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
142
3
Best Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookies
(www.cisa.gov)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
1 comments
fedilink
143
4
Spam With A Political Twist: Fraudsters Are Exploiting The Election Season
(www.trustwave.com)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
144
1
Linux Detection Engineering - A primer on persistence mechanisms
(www.elastic.co)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
145
2
Threat landscape for industrial automation systems, Q2 2024
(securelist.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
146
1
Microsoft Releases October 2024 Security Updates
(www.cisa.gov)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
147
1
How to leverage $200 million FCC program boosting K-12 cybersecurity
(www.bleepingcomputer.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
148
8
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader
(cloud.google.com)
submitted
3 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
149
1
Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool
(unit42.paloaltonetworks.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
150
1
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups
(securelist.com)
submitted
2 days ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
view more:
‹ prev
next ›