shellsharks@infosec.pubM · 19 hours agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square5fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 19 hours agomessage-square5fedilink
cm0002@lemmy.world · 4 days agoPostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacksplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkPostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacksplus-squarethehackernews.comcm0002@lemmy.world · 4 days agomessage-square0fedilink
Cat@ponder.cat · 6 days agoCISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.plus-squarewww.cisa.govexternal-linkmessage-square2fedilinkarrow-up115arrow-down12
arrow-up113arrow-down1external-linkCISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software.plus-squarewww.cisa.govCat@ponder.cat · 6 days agomessage-square2fedilink
shellsharks@infosec.pubM · 6 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square3fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 6 days agomessage-square3fedilink
cm0002@lemmy.world · 7 days agoSeven Years Old Linux Kernel Vulnerability Let Attackers Execute Remote Codeplus-squarecybersecuritynews.comexternal-linkmessage-square4fedilinkarrow-up118arrow-down16
arrow-up112arrow-down1external-linkSeven Years Old Linux Kernel Vulnerability Let Attackers Execute Remote Codeplus-squarecybersecuritynews.comcm0002@lemmy.world · 7 days agomessage-square4fedilink
shellsharks@infosec.pubM · 4 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 4 days agomessage-square0fedilink
cm0002@lemmy.world · 6 days agoUSB Army Knife – A Powerful Red Team Tool for Penetration Testersplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkUSB Army Knife – A Powerful Red Team Tool for Penetration Testersplus-squarecybersecuritynews.comcm0002@lemmy.world · 6 days agomessage-square1fedilink
Cat@ponder.cat · 5 days agoThe BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.plus-squarewww.microsoft.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkThe BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation.plus-squarewww.microsoft.comCat@ponder.cat · 5 days agomessage-square0fedilink
cm0002@lemmy.world · 7 days agoOver 12,000 KerioControl firewalls exposed to exploited RCE flawplus-squarewww.bleepingcomputer.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkOver 12,000 KerioControl firewalls exposed to exploited RCE flawplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 7 days agomessage-square1fedilink
shellsharks@infosec.pubM · 8 days agoMentorship Monday - Discussions for career and learning!plus-squaremessage-squaremessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareMentorship Monday - Discussions for career and learning!plus-squareshellsharks@infosec.pubM · 8 days agomessage-square0fedilink
cm0002@lemmy.world · 10 days agoViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comexternal-linkmessage-square3fedilinkarrow-up190arrow-down10
arrow-up190arrow-down1external-linkViolet Blue: America’s unfolding cybersecurity catastropheplus-squaremedium.comcm0002@lemmy.world · 10 days agomessage-square3fedilink
shellsharks@infosec.pubM · 11 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 11 days agomessage-square0fedilink
cm0002@lemmy.world · 12 days agoHackers spoof Microsoft ADFS login pages to steal credentialsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkHackers spoof Microsoft ADFS login pages to steal credentialsplus-squarewww.bleepingcomputer.comcm0002@lemmy.world · 12 days agomessage-square0fedilink
shellsharks@infosec.pubM · 13 days agoWhat are You Working on Wednesdayplus-squaremessage-squaremessage-square8fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1message-squareWhat are You Working on Wednesdayplus-squareshellsharks@infosec.pubM · 13 days agomessage-square8fedilink
cm0002@lemmy.world · 13 days agoResearcher sniffs out three-year Go supply chain attackplus-squarewww.theregister.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkResearcher sniffs out three-year Go supply chain attackplus-squarewww.theregister.comcm0002@lemmy.world · 13 days agomessage-square1fedilink
mwguy@infosec.exchange · 13 days agoMusk’s DOGE Minions Refuse to Reveal Their Names When Grilling Civil Servantsplus-squaremessage-squaremessage-square0fedilinkarrow-up121arrow-down12
arrow-up119arrow-down1message-squareMusk’s DOGE Minions Refuse to Reveal Their Names When Grilling Civil Servantsplus-squaremwguy@infosec.exchange · 13 days agomessage-square0fedilink
shellsharks@infosec.pubM · 18 days agoOff-Topic Fridayplus-squaremessage-squaremessage-square2fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1message-squareOff-Topic Fridayplus-squareshellsharks@infosec.pubM · 18 days agomessage-square2fedilink
cm0002@lemmy.world · 22 days agoGoogle takes action to counter G.co phishing abuseplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down12
arrow-up14arrow-down1external-linkGoogle takes action to counter G.co phishing abuseplus-squarewww.theregister.comcm0002@lemmy.world · 22 days agomessage-square0fedilink
cm0002@lemmy.world · 24 days agoRANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementationsplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up135arrow-down10
arrow-up135arrow-down1external-linkRANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementationsplus-squarethehackernews.comcm0002@lemmy.world · 24 days agomessage-square0fedilink
cm0002@lemmy.world · 25 days agoNew Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detectionplus-squarecybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkNew Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detectionplus-squarecybersecuritynews.comcm0002@lemmy.world · 25 days agomessage-square1fedilink