/f/research

Pentagon finds concerning vulnerabilities on blockchain _techrepublic.com
| posted in rouiejay12 No comments |
1

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture _threatpost.com
| posted in rouiejay12 No comments |
1

Gamification of Ethical Hacking and Hacking Esports _threatpost.com
| posted in rouiejay12 No comments |
1

Internet scans find 1.6 million secrets leaked by websites _portswigger.net
| posted in rouiejay12 No comments |
1

Google expert detailed a 5-Year-Old flaw in Apple Safari exploited in the wild _securityaffairs.co
| posted in rouiejay12 No comments |
1

China-linked APT Flew Under Radar for Decade _threatpost.com
| posted in rouiejay12 No comments |
1

How to Combat Ransomware Attacks with Zero Trust _gbhackers.com
| posted in rouiejay12 No comments |
1

Radware Finds New Era of DDoS Attacks Dawning _securityboulevard.com
| posted in rouiejay12 No comments |
1

OMIGOD: Cloud providers still using secret middleware _theregister.com
| posted in rouiejay12 No comments |
1

Keeping Web-Browsing Data Safe from Hackers _homelandsecuritynewswire.com
| posted in rouiejay12 No comments |
1

MIT Researchers Discover New Flaw in Apple M1 CPUs That Can't Be Patched _thehackernews.com
| posted in rouiejay12 No comments |
1

Using the random motion of electrons to improve cybersecurity _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

You can be tracked via your Bluetooth signal, researchers claim _grahamcluley.com
| posted in rouiejay12 No comments |
1

Tainted CCleaner Pro Cracker spreads via Black Seo campaign _securityaffairs.co
| posted in rouiejay12 No comments |
1

Critical Vulnerability Found in Motorola’s Unisoc Chips _infosecurity-magazine.com
| posted in rouiejay12 No comments |
1

Researcher goes public with WordPress CSP bypass hack _portswigger.net
| posted in rouiejay12 No comments |
1

Clipminer Botnet already allowed operators to make at least $1.7 Million _securityaffairs.co
| posted in rouiejay12 No comments |
1

Evil Corp Pivots LockBit to Dodge U.S. Sanctions _threatpost.com
| posted in rouiejay12 No comments |
1

Exposing POLONIUM activity and infrastructure targeting Israeli organizations _microsoft.com
| posted in rouiejay12 No comments |
1

New study reveals serious disconnect in executive planning for cyberattacks _betanews.com
| posted in rouiejay12 No comments |
1

The Underground Company That Hacks iPhones for Ordinary Consumers _vice.com
| posted in rouiejay12 No comments |
1

CVE-2022-26082: Vulnerabilities in the Open Automation Software Platform _sensorstechforum.com
| posted in rouiejay12 No comments |
1

These are the flaws that let hackers attack blockchain and DeFi projects _zdnet.com
| posted in rouiejay12 No comments |
1

Cybersecurity: A global problem that requires a global answer _welivesecurity.com
| posted in rouiejay12 No comments |
1

Mysterious disclosure of a zero-day RCE flaw Spring4Shell in Spring _securityaffairs.co
| posted in rouiejay12 No comments |
1

Researchers Find Python-Based Ransomware Targeting Jupyter Notebook Web Apps _securityweek.com
| posted in rouiejay12 No comments |
1

Attackers compromise 94% of critical assets within four steps of initial breach _csoonline.com
| posted in rouiejay12 No comments |
1

Healthcare industry still lagging in multicloud adoption _techrepublic.com
| posted in rouiejay12 No comments |
1

Man-in-the-middle (MitM) attack definition and examples _csoonline.com
| posted in rouiejay12 No comments |
1

One tenth of UK staff bypass corporate security _itsecurityguru.org
| posted in rouiejay12 No comments |
1

Ransomware Can Encrypt 100,000 Files in Minutes _sea.pcmag.com
| posted in rouiejay12 No comments |
1

BEC scams cost victims more than ransomware _en.secnews.gr
| posted in rouiejay12 No comments |
1

AvosLocker ransomware - what you need to know _tripwire.com
| posted in rouiejay12 No comments |
1

Phishing-kit market: what’s inside “off-the-shelf” phishing packages _securelist.com
| posted in rouiejay12 No comments |
1

LockBit beats REvil and Ryuk in Splunk’s ransomware encryption speed test _techrepublic.com
| posted in rouiejay12 No comments |
1

New survey shows a widespread lack of cybersecurity preparation in SMBs _blog.avast.com
| posted in rouiejay12 No comments |
1

Sandworm: A tale of disruption told anew _welivesecurity.com
| posted in rouiejay12 No comments |
1

Downdetector: How the popular site outage tracker is helping to improve web security _portswigger.net
| posted in rouiejay12 No comments |
1

How prepared are organizations to face a ransomware attack on Kubernetes? _helpnetsecurity.com
| posted in rouiejay12 No comments |
1

Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware _thehackernews.com
| posted in rouiejay12 No comments |
1