26
9
submitted 5 days ago by [email protected] to c/[email protected]

The safest option is obvious, don't try to access its contents, but if you absolutely had to, what steps would you take to minimize/contain any potential harm to your device/network?

27
10
submitted 5 days ago by [email protected] to c/[email protected]
28
7
submitted 5 days ago by [email protected] to c/[email protected]
29
6
submitted 5 days ago by [email protected] to c/[email protected]
30
6
submitted 5 days ago by [email protected] to c/[email protected]
31
4
submitted 5 days ago by [email protected] to c/[email protected]
32
3
submitted 5 days ago by [email protected] to c/[email protected]

Link goes to https://tfl.gov.uk/campaign/cyber-security-incident?cid=email_FINAL_TFLU369_Security_update-CTA_text_website

Got this email today. It seems someone is getting fired in the IT department...

33
3
submitted 5 days ago by [email protected] to c/[email protected]
34
2
submitted 5 days ago by [email protected] to c/[email protected]
35
4
submitted 6 days ago* (last edited 6 days ago) by [email protected] to c/[email protected]

5G in Australia or Malaysia - who did it better?

During my trip to Malaysia, I noticed a Huawei store—something that’s become rare in Australia. While Huawei phones aren’t banned, they’re hard to find due to the lack of Google services and Australia’s reliance on those seevices.

But it got me thinking: Australia has excluded Huawei from its 5G infrastructure, whereas Malaysia has taken a different approach by considering Huawei’s involvement in its 5G rollout. How do you view these differing tech strategies?

Tags for federation:

@cybersecurity
@austech

#infosec

36
13
submitted 1 week ago by [email protected] to c/[email protected]

Security researchers have found a vulnerability in a key air transport security system that allowed unauthorized individuals to potentially bypass airport security screenings and gain access to aircraft cockpits.

37
6
submitted 1 week ago by [email protected] to c/[email protected]

The global malware campaign (that must not be named?) is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control.

38
1
submitted 1 week ago by [email protected] to c/[email protected]
39
3
submitted 1 week ago by [email protected] to c/[email protected]
40
2
submitted 1 week ago by [email protected] to c/[email protected]
41
2
submitted 1 week ago by [email protected] to c/[email protected]
42
2
submitted 1 week ago by [email protected] to c/[email protected]
43
2
submitted 1 week ago by [email protected] to c/[email protected]

Findings undercut pledges of NSO Group and Intgellexa their wares won't be abused.

44
1
submitted 1 week ago by [email protected] to c/[email protected]
45
1
submitted 1 week ago by [email protected] to c/[email protected]

The APT33 Iranian hacking group has used new Tickler malware to backdoor the networks of organizations in the government, defense, satellite, oil and gas sectors in the United States and the United Arab Emirates.

46
1
submitted 1 week ago by [email protected] to c/[email protected]

Novel attack vectors leverage the CVE-2023-22527 RCE flaw discovered in January, which is still under active attack, to turn targeted cloud environments into cryptomining networks.

47
1
submitted 1 week ago by [email protected] to c/[email protected]

Google has more than doubled payouts for Google Chrome security flaws reported through its Vulnerability Reward Program, with the maximum possible reward for a single bug now exceeding $250,000.

48
1
submitted 1 week ago by [email protected] to c/[email protected]

The company has assessed four of the five disclosed vulnerabilities as being of high to critical severity.

49
1
submitted 1 week ago by [email protected] to c/[email protected]

International sanctions, IT isolation, and shifting attitudes to ethical hacking have bug bounty programs on the rise in Russia, with zero-day acquisition companies potentially poised to profit.

50
1
submitted 1 week ago by [email protected] to c/[email protected]

Vulnerability is easy to exploit and allows attackers to remotely execute commands.

view more: ‹ prev next ›

Cybersecurity

5358 readers
88 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS