/f/research
- Vulnerabilities could let hackers remotely shut down EV chargers, steal electricity
_cyberscoop.com
-
|
posted in
rouiejay12
|
- Sextortion Scams – How They Persuade and What to Watch for
_tripwire.com
-
|
posted in
rouiejay12
|
- How to use Microsoft KQL for SIEM insight
_techrepublic.com
-
|
posted in
rouiejay12
|
- How have cryptocurrencies influenced cybercrime?
_blog.avast.com
-
|
posted in
rouiejay12
|
- Too many default 'admin1234' passwords increase risk for industrial systems, research finds
_cyberscoop.com
-
|
posted in
rouiejay12
|
- Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security
_nakedsecurity.sophos.com
-
|
posted in
rouiejay12
|
- Critical RCE vulnerabilities found in git (CVE-2022-41903, CVE-2022-23251)
_helpnetsecurity.com
-
|
posted in
rouiejay12
|
- Predator inside story: SMS the key to the wiretapping investigation
_en.secnews.gr
-
|
posted in
rouiejay12
|
- Too many default 'admin1234' passwords increase risk for industrial systems, research finds
_cyberscoop.com
-
|
posted in
rouiejay12
|
- Thinking of Hiring or Running a Booter Service? Think Again.
_krebsonsecurity.com
-
|
posted in
rouiejay12
|
- Security experts develop method of generating 'highly evasive' polymorphic malware using ChatGPT
_itpro.com
-
|
posted in
rouiejay12
|
- Researchers: Brace for Zoho ManageEngine 'Spray and Pray' Attacks
_securityweek.com
-
|
posted in
rouiejay12
|
- How attackers might use GitHub Codespaces to hide malware delivery
_csoonline.com
-
|
posted in
rouiejay12
|
- New Research Shows Raspberry Robin Can Be Repurposed by Other Threat Actors
_heimdalsecurity.com
-
|
posted in
rouiejay12
|
- Microsoft retracts its report on Mac ransomware
_techrepublic.com
-
|
posted in
rouiejay12
|
- Researchers Find 'Digital Crime Haven' While Investigating Magecart Activity
_darkreading.com
-
|
posted in
rouiejay12
|
- Researchers claim CircleCI breach may affect other cloud, third-party applications
_scmagazine.com
-
|
posted in
rouiejay12
|
- How to configure an SMTP server in a self-hosted instance Passbolt
_techrepublic.com
-
|
posted in
rouiejay12
|
- Chinese researchers' claimed quantum encryption crack looks unlikely
_theregister.com
-
|
posted in
rouiejay12
|
- RSA crypto cracked? Or perhaps not!
_nakedsecurity.sophos.com
-
|
posted in
rouiejay12
|
- Cloud email services bolster encryption against hackers
_techrepublic.com
-
|
posted in
rouiejay12
|
- Tips and tricks for securing data when migrating to the cloud
_techrepublic.com
-
|
posted in
rouiejay12
|
- Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide
_gbhackers.com
-
|
posted in
rouiejay12
|
- Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers
_thehackernews.com
-
|
posted in
rouiejay12
|
- What is multi-factor authentication (MFA) fatigue and how do you defend against attacks?
_itpro.com
-
|
posted in
rouiejay12
|
- How to deploy a self-hosted instance of the Passbolt password manager
_techrepublic.com
-
|
posted in
rouiejay12
|
- “Don’t let your ignorance make you vulnerable to IoT attacks.”
_securityboulevard.com
-
|
posted in
rouiejay12
|
- 2022 in review: 10 of the year’s biggest cyberattacks
_welivesecurity.com
-
|
posted in
rouiejay12
|
- Vice Society ransomware: Adopted a new custom encryptor
_en.secnews.gr
-
|
posted in
rouiejay12
|
- Lean, green coding machine: How sustainable computing drive can reduce attack surfaces
_portswigger.net
-
|
posted in
rouiejay12
|
- MTTR “not a viable metric” for complex software system reliability and security
_csoonline.com
-
|
posted in
rouiejay12
|
- An Alleged Russian Smuggling Ring Was Uncovered in New Hampshire
_wired.com
-
|
posted in
rouiejay12
|
- New Technique Discovered To Bypass Web Application Firewalls
_gbhackers.com
-
|
posted in
rouiejay12
|
- Cybersecurity adoption hampered by shortage of skills and poor product integration
_techrepublic.com
-
|
posted in
rouiejay12
|
- Researchers found security pitfalls in IBM’s cloud infrastructure
_csoonline.com
-
|
posted in
rouiejay12
|
- Intel disputes seriousness of Data Centre Manager authentication flaw
_portswigger.net
-
|
posted in
rouiejay12
|
- Experts found a vulnerability in AWS AppSync
_securityaffairs.co
-
|
posted in
rouiejay12
|
- U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer
_krebsonsecurity.com
-
|
posted in
rouiejay12
|
- How social media scammers buy time to steal your 2FA codes
_nakedsecurity.sophos.com
-
|
posted in
rouiejay12
|
- Researchers Quietly Cracked Zeppelin Ransomware Keys
_krebsonsecurity.com
-
|
posted in
rouiejay12
|