About IOC's and threat names

Cyber SubReddits
ISO/IEC 42001: What's Your Take on AI Governance?
What is your opinion on AI tools and it's impact on Cybersecurity? To what length would it be able to automate tasks?
GitHub - TracecatHQ/tracecat: 😼 The AI-native, open source alternative to Tines / Splunk SOAR.
Inside the shadowy global battle to tame the world's most dangerous technology.
Quantifying attack surface
New MFA-bypassing phishing kit targets Microsoft 365, Gmail accounts
Is there any tool that can automatically generate pentest reports?
Russian-backed APT29 Group Targets German Political Parties with WINELOADER Malware
Is Microsoft DirectAccess not compliant for todays audits?
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
Stateless Password Manager
ShadowRay: First Known Attack Campaign Targeting AI Workloads Exploited In The Wild
Hackers Breached Hundreds Of Companies’ AI Servers, Mined Crypto for >1 Year Before Discovery
SWE to cyber or CSE to cyber
How do phishing simulation services track when an email attachment has been opened?
Should I get CE|H(pay for it)
Hackers charged with targeting perceived critics of China
Made this fully automated vulnerability scanning project that uses multiple AI Agents that work together as a proof of concept only
Visual/Graphic learning
Automated Vulnerability Scanning with Agentic AI. Proof of concept, check out the sample run, watch them talk together.
Avalor's NextGen Vulnerability Management product
Guidance for Developers to make it hard on attackers (DDoS) — Withstand Security
Cve's
Are people actually using smart contracts vulnerabilities scanners?
How to get Senior SOC / Security analyst/engineer experience without being able to get a job in cybersecurity due to the death of junior/entry level positions ?
How Cydanix Application Control Works
GRC Podcast Episode on Information Security in Universities
UK accuses China of cyberattacks on British democracy
A phishing link is being circulated in Whatsapp