Cybersecurity
9534 readers
13 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
founded 2 years ago
MODERATORS
1
14
GitLab Patches Multiple Vulnerabilities That Enables DoS and Cross-site Scripting Attacks
(cybersecuritynews.com)
2
15
Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
(thehackernews.com)
3
4
5
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
(thehackernews.com)
5
2
Coinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategy
(cybersecuritynews.com)
6
15
DPRK IT Workers Impersonating Individuals Using Real LinkedIn Accounts to Apply for Remote Roles
(cybersecuritynews.com)
7
8
10
GuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defenses
(cybersecuritynews.com)
9
10
8
Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
(thehackernews.com)
11
24
Claude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacks
(cybersecuritynews.com)
12
13
14
7
New Node.js Based LTX Stealer Attackers Users to Exfiltrate Login Credentials
(cybersecuritynews.com)
15
16
3
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign
(thehackernews.com)
17
18
19
20
21
5
Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
(thehackernews.com)
22
5
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
(thehackernews.com)
23
24
25
3
RenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controls
(cybersecuritynews.com)
view more: next ›
