conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Hostile wizardry takes on the form of war across the Turanian wastelands. https://cromwell-intl.com/cybersecurity/cyberwar/israel.html?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

A warrior must journey to distant realms. Stay safe while traversing remote roads and caravanserais. https://cromwell-intl.com/cybersecurity/basics/10-road-warrior.html?s=mc

evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

Oh and in case there a journalists from the Netherlands in my bubble (or in yours, please share!): It might be interesting to do a follow-up to our article (which will be published tomorrow) because WebEx leaked tons of data from the Dutch government.
Feel free to contact me for further information.

evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

Ok, ich habe gestern mittag ein paar Anfragen rausgeschickt - und eine Deadline genannt, weil meine Erfahrung zeigt, dass sonst erstmal gar nichts passiert. Ich habe aber nicht gesagt, dass man mir erst dann antworten DARF. Trotzdem sind alle Antworten quasi gleichzeitig heute Abend eingetrudelt. Wie Deadline-Abhängig sind deutsche Behörden und US-Konzerne? 😂
Text kommt morgen früh :)

aeveltstra, to Cybersecurity
@aeveltstra@mastodon.social avatar

https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/

When a expert manages to escalate a wrongly-classified into a correct classification, we find a bug in that allows for arbitrary remote code execution by an unprivileged user.

thejapantimes, to Japan
@thejapantimes@mastodon.social avatar

Japanese police have arrested a 17-year-old boy for allegedly stealing IDs and passwords of people attempting to buy his fictitious online game account by guiding them to a fraudulent website. https://www.japantimes.co.jp/news/2024/06/04/japan/crime-legal/teen-steal-fake-ids/

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

Russian Cyber Army Claims Alleged Cyberattack on Bulgarian Ports Infrastructure Company https://thecyberexpress.com/bulgarian-ports-infrastructure-cyberattack/?utm_source=dlvr.it&utm_medium=mastodon

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar

"On or around May 12, 2024, ARRL was the victim of a sophisticated network attack by a malicious international cyber group. ARRL immediately involved the FBI and engaged with third party experts to investigate.

This serious incident was extensive and categorized by the FBI as “unique,” compromising network devices, servers, cloud-based systems, and PCs...."

http://arrl.org/news/arrl-systems-service-disruption

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
ezlin, to telegram
@ezlin@gamepad.club avatar

huh, so there's a data breach of some sort and my details appear to be in it, although I have zero memory of ever using Telegram. I suppose it's possible that I briefly installed it as I /am/ likely to check secure & private messengers, but Telegram is actually neither of those things despite their claims.

So yeah, a bit confused that I'm in the list of compromised accounts on it but whatevs.

Anyway, FYI if you use it.

More info:

https://www.troyhunt.com/telegram-combolists-and-361m-email-addresses/

ohmu, to infosec
@ohmu@social.seattle.wa.us avatar


A large western Washington municipality that rhymes with "free cattle" is going to post an opportunity for a new OT manager in a few weeks.

For a variety of reasons, I am very invested in this position even though I'm just lowly water engineer.
Please stay tuned. I will post a link here when I have it myself.

Please spread the word wherever infosec folks gather.

My hope is that this will be an opportunity for some culture change.

br00t4c, to Cybersecurity
@br00t4c@mastodon.social avatar

This Hacker Tool Extracts All the Data Collected by Windows' New Recall AI

https://www.wired.com/story/total-recall-windows-recall-ai/

ErikJonker, to Cybersecurity Dutch
@ErikJonker@mastodon.social avatar

Critical incident declared as ransomware attack disrupts multiple London hospitals.
https://therecord.media/london-hospitals-ransomware-attack-critical-incident-declared

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
bogo, to Cybersecurity
@bogo@hapyyr.com avatar

Dear amazing people.

As of today, I offer you two new workshops that you might want to add into your plan of being smarter:

  1. Visual Threat Modeling (there is a dog involved)

  2. Me(n)tal Health: Learn and improve your soft skills with heavy metal.

See more here: https://talkweb.eu/join-my-two-new-workshops/

evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

Please help: I am looking for a spokesperson or even better a CISO of the government of the Netherlands - ideally both. I need a quick and easy contact for an IT security related issue. The website is not helpful.

dethos, to security
@dethos@s.ovalerio.net avatar

"Hacking Millions of Modems (and Investigating Who Hacked My Modem)"

https://samcurry.net/hacking-millions-of-modems

#security #infosec #netsec #cybersecurity

evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

Oops, wieder in ein fremdes Webex-Meeting verirrt. 😜
Aber die Menschen nehmen es mit Humor. "Hallo, mein Name ist Eva Wolfangel, Ich recherchiere über Sicherheitslücken bei Webex Nur ganz kurzes Schweigen. Dann: "Herzlichen Glückwunsch, die Recherche scheint erfolgreich zu sein."

Artikel kommt bald - und ja: das Problem ist seit meinen beiden anderen Artikeln ... größer geworden.

HistoPol, (edited )
@HistoPol@mastodon.social avatar

@evawolfangel

Ist es denn eine systemische Sicherheitslücke oder eher eine menschliche:
zu grosse Sorglosigkeit mit dem Umgang von Einladungsmails/Meetingadressen und z.B. Nichtverwendung oder schlampige Nutzung der "Vorzimmer"-Funktion?

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

A warrior must be able to advise a ruler as to how to avoid running afoul of arcane laws. https://cromwell-intl.com/cybersecurity/regulations.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

This merchant vessel once carried secrets for those who listened in on hostile realms. Here are tales of life on board. https://cromwell-intl.com/cybersecurity/history/uss-chaumont/photos-other.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Hostile wizardry takes on the form of war beyond the Turanian wastelands. https://cromwell-intl.com/cybersecurity/cyberwar/iran.html?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

On Twitch delving into Qubes OS Tinkering | VPN | I2P vs Tor | DEFCON Prep | Cybersecurity and Chill | Gaming on Linux. Dive with us: https://twitch.tv/chiefgyk3d 🚀

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines