/f/research

Vulnerabilities could let hackers remotely shut down EV chargers, steal electricity _cyberscoop.com
| posted in rouiejay12 No comments |
1

Sextortion Scams – How They Persuade and What to Watch for _tripwire.com
| posted in rouiejay12 No comments |
1

How to use Microsoft KQL for SIEM insight _techrepublic.com
| posted in rouiejay12 No comments |
1

How have cryptocurrencies influenced cybercrime? _blog.avast.com
| posted in rouiejay12 No comments |
1

Too many default 'admin1234' passwords increase risk for industrial systems, research finds _cyberscoop.com
| posted in rouiejay12 No comments |
1

Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Critical RCE vulnerabilities found in git (CVE-2022-41903, CVE-2022-23251) _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Predator inside story: SMS the key to the wiretapping investigation _en.secnews.gr
| posted in rouiejay12 No comments |
1

Too many default 'admin1234' passwords increase risk for industrial systems, research finds _cyberscoop.com
| posted in rouiejay12 No comments |
1

Thinking of Hiring or Running a Booter Service? Think Again. _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

Security experts develop method of generating 'highly evasive' polymorphic malware using ChatGPT _itpro.com
| posted in rouiejay12 No comments |
1

Researchers: Brace for Zoho ManageEngine 'Spray and Pray' Attacks _securityweek.com
| posted in rouiejay12 No comments |
1

How attackers might use GitHub Codespaces to hide malware delivery _csoonline.com
| posted in rouiejay12 No comments |
1

New Research Shows Raspberry Robin Can Be Repurposed by Other Threat Actors _heimdalsecurity.com
| posted in rouiejay12 No comments |
1

Microsoft retracts its report on Mac ransomware _techrepublic.com
| posted in rouiejay12 No comments |
1

Researchers Find 'Digital Crime Haven' While Investigating Magecart Activity _darkreading.com
| posted in rouiejay12 No comments |
1

Researchers claim CircleCI breach may affect other cloud, third-party applications _scmagazine.com
| posted in rouiejay12 No comments |
1

How to configure an SMTP server in a self-hosted instance Passbolt _techrepublic.com
| posted in rouiejay12 No comments |
1

Chinese researchers' claimed quantum encryption crack looks unlikely _theregister.com
| posted in rouiejay12 No comments |
1

RSA crypto cracked? Or perhaps not! _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Cloud email services bolster encryption against hackers _techrepublic.com
| posted in rouiejay12 No comments |
1

Tips and tricks for securing data when migrating to the cloud _techrepublic.com
| posted in rouiejay12 No comments |
1

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide _gbhackers.com
| posted in rouiejay12 No comments |
1

Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers _thehackernews.com
| posted in rouiejay12 No comments |
1

What is multi-factor authentication (MFA) fatigue and how do you defend against attacks? _itpro.com
| posted in rouiejay12 No comments |
1

How to deploy a self-hosted instance of the Passbolt password manager _techrepublic.com
| posted in rouiejay12 No comments |
1

“Don’t let your ignorance make you vulnerable to IoT attacks.” _securityboulevard.com
| posted in rouiejay12 No comments |
1

2022 in review: 10 of the year’s biggest cyberattacks _welivesecurity.com
| posted in rouiejay12 No comments |
1

Vice Society ransomware: Adopted a new custom encryptor _en.secnews.gr
| posted in rouiejay12 No comments |
1

Lean, green coding machine: How sustainable computing drive can reduce attack surfaces _portswigger.net
| posted in rouiejay12 No comments |
1

MTTR “not a viable metric” for complex software system reliability and security _csoonline.com
| posted in rouiejay12 No comments |
1

An Alleged Russian Smuggling Ring Was Uncovered in New Hampshire _wired.com
| posted in rouiejay12 No comments |
1

New Technique Discovered To Bypass Web Application Firewalls _gbhackers.com
| posted in rouiejay12 No comments |
1

Cybersecurity adoption hampered by shortage of skills and poor product integration _techrepublic.com
| posted in rouiejay12 No comments |
1

Researchers found security pitfalls in IBM’s cloud infrastructure _csoonline.com
| posted in rouiejay12 No comments |
1

Intel disputes seriousness of Data Centre Manager authentication flaw _portswigger.net
| posted in rouiejay12 No comments |
1

Experts found a vulnerability in AWS AppSync _securityaffairs.co
| posted in rouiejay12 No comments |
1

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer _krebsonsecurity.com
| posted in rouiejay12 No comments |
1

How social media scammers buy time to steal your 2FA codes _nakedsecurity.sophos.com
| posted in rouiejay12 No comments |
1

Researchers Quietly Cracked Zeppelin Ransomware Keys _krebsonsecurity.com
| posted in rouiejay12 No comments |
1