Announcements
Anything
AskPoal
Funny
Gaming
Gifs
History
Introductions
News
Pics
Poaldev
Politics
Science
Strange
technology
TheLobby
TIL
Videos
Search is disabled.
You have to level up first.
link
text
poll
JavaScript is disabled or this browser is too old
JustICE must be served
JavaScript is disabled or this browser is too old
ALL
cybersecurity
HOT
NEW
POP
TOP
ALL
cybersecurity
HOT
NEW
POP
TOP
Log in
Register
Donate
Welcome
•
User Guide
ToS
•
Privacy
•
Canary
Donate
•
Bugs
•
License
©2026 Poal.co
ᐊ
page 15
ᐅ
608
•
Keylogger keyboard leaks passwords via Apple's "Find My" location network | heise online
792
•
Okta hit by another breach, this one stealing employee data from 3rd-party vendor
1.4K
•
This tiny device is sending updated iPhones into a never-ending DoS loop (Flipper Zero)
4
1.4K
•
Morris (computer) worm released 35 years ago today (1988).
873
•
Ultrasound Tracking Could Be Used to Deanonymize Tor Users - Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser can deanonymize Tor users by making nearby phones or computers send identity beacons back to advertisers.
1
1.5K
•
Android Devices With Backdoored Firmware Found in US Schools - SecurityWeek
955
•
Microsoft breach led to theft of 60,000 US State Dept emails
127
•
Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and Thunderbird
1
1.2K
▶︎
•
Woman Successfully Hacked [0:25]
1
857
•
Top Suspect in 2015 Ashley Madison Hack Committed Suicide in 2014
1.3K
•
The Simplest Social Engineering Hack Of Them All
5
576
•
Introduction of Electromagnetic Information Security
85
•
Google Drive security flaw allows data to be stolen without trace
7
445
•
Lazarus hackers target Windows IIS web servers for initial access
517
•
Clever ‘File Archiver In The Browser’ phishing trick uses ZIP domains
1
1.5K
▶︎
•
WEF Klaus Schwab - “Predicting” a Cyber Pandemic. Video (1:32)
1.3K
•
Barracuda warns of email gateways breached via zero-day flaw
1.5K
•
New PowerExchange malware backdoors Microsoft Exchange servers
937
•
(ISC)² Statement on Security Congress 2023
2
936
[deleted]
•
LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads (really gotta run those ad blockers...)
589
[deleted]
•
Used routers often come loaded with corporate secrets
1
904
[deleted]
•
This Week In Security: Cookie Monster, CyberGhost, NEXX, And Dead Angles
736
•
Wave of Stealthy China Cyberattacks Hits U.S., Private Networks, google Says. Attacks represent new level of ingenuity and sophistication from China, according to researchers.
116
•
Cisco warns of auth bypass bug with public exploit in EoL routers
257
•
EarSpy can eavesdrop on your phone conversations using motion sensors
ᐊ
page 15
ᐅ
/s/cybersecurity
created
ago