in the future - u will be able to do some more stuff here,,,!! like pat catgirl- i mean um yeah... for now u can only see others's posts :c
π We're Back and Stronger than Ever! π
Hey there, amazing community! We know it's been a bit of a rollercoaster lately, but we're thrilled to announce that we're back and ready to bring you the best in cybersecurity, DevOps, web development, and more!
After some challenges with community guidelines, we've regrouped and are committed to providing you with top-notch, ethical content. Our mission is to deliver value while keeping things safe and respectful.
π Subscribe, hit that notification bell, and stay tuned for exciting updates and insights. We've even expanded our team to ensure you get the very best content. We can't wait to embark on this journey with you all over again.
Thank you for your continued support! π Let's make this community even stronger and more awesome together! πͺ #WeAreBack #EthicalContent #SubscribeNow
3 - 0
New breach: Indian grocery platform bigbasket had over 20M records breached in Oct. Data included email, IP and physical addresses, names, phones numbers, DoBs and Django(SHA-1) password hashes. 52% were already in @haveibeenpwned.
3 - 0
Cybercriminals are now using Telegram messenger to control ToxicEye malware deployed on infected computers remotely.
5 - 0
Google Chrome users should UPDATE (90.0.4430.85 or above) their browsers immediately to fix a high-risk vulnerability for which no patch was available for a week after a PoC exploit was made public.
2 - 1
Watch Out! Researchers have spotted a new set of fraudulent Android appsβwith over 700,000 downloadsβon the Google Play store that hijack SMS notifications for billing scams.
2 - 0
A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information.
7 - 1
D A R K _ News
Researchers have found multiple severe vulnerabilities affecting OpENer EtherNet/IP stack used in industrial systems that could enable DoS, RCE, and memory leak attacks.
7 - 0
Welcome to codesec - Your Gateway to the Digital World! π
π Cybersecurity Enthusiast π
Are you curious about the ever-evolving world of cybersecurity? Dive into our channel to explore the latest threats, defense strategies, and expert insights. We're here to help you stay safe in the digital realm.
π§ DevOps Engineer Mastery π§
For all the DevOps enthusiasts out there, we're your go-to resource! Learn about automation, continuous integration, and best practices to streamline software development and deployment. Empower your DevOps journey with our expert guidance.
π» Web Development Wizardry π»
Whether you're a coding newbie or a seasoned developer, we've got something for you. From HTML to full-stack development, our tutorials and tips will help you sharpen your web development skills and stay ahead in this dynamic field.
Join our community of tech-savvy individuals, where we explore the cutting edge of cybersecurity, DevOps, and web development. Subscribe now