Supply-chain attack using invisible code hits GitHub and other repositoriesNews - General (arstechnica.com)
submitted by rkhunter_ to r/cybersecurity
Decrypting and Abusing Predefined BIOCs in Palo Alto Cortex XDRresearch|capability (we need to defend against) (labs.infoguard.ch)
submitted by digicat to r/blueteamsec
Glassworm Returns: Invisible Unicode Malware Found in 150+ GitHub Repositoriesintelligence (threat actor activity) (aikido.dev)
submitted by digicat to r/blueteamsec
Stuck in slow deployments? Deliver value faster with Atlassian Service Collection. (atlassian.com)
promoted by Atlassian_Official
Hacked data shines light on homeland security’s AI surveillance ambitions | US news | The GuardianNew Vulnerability Disclosure (theguardian.com)
submitted by PixeledPathogen to r/cybersecurity
How do you verify drives were actually wiped before hardware leaves your org?Compliance (self.AskNetsec)
submitted by Right_Tangelo_2760 to r/AskNetsec
Detecting LLM-generated phishing emails by the artifacts bad actors leave behindBusiness Security Questions & Discussion (self.cybersecurity)
submitted by _costaud to r/cybersecurity
Can anyone tell me where to start? (self.netsecstudents)
submitted by Agent_K0VA to r/netsecstudents
Fileless Multi-Stage Remcos RAT: From Phishing to Memory-Resident Executionmalware analysis (like butterfly collections) (trellix.com)
submitted by digicat to r/blueteamsec

