chiefgyk3d, to Twitch
@chiefgyk3d@social.chiefgyk3d.com avatar

Today is Mother’s Day so I took my grandmother out for lunch and having dinner with my aunt. I may be on Twitch later this evening than usual.

#twitch #mothersday #cybersecurity #infosec #gaming #gamingonlinux

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
mttaggart, to rust

Late-night #BlueTeam tool release!

Introducing entropyscan-rs, a #RustLang entropy scanner for analyzing files and directories during incident response. Used carefully, this can quickly identify likely malware when not all stages of an attack have been discovered, such as during a web server compromise without adequate logging. Enjoy!

github.com/mttaggart/entropyscan-rs

#CyberSecurity #InfoSec

paul, to infosec
@paul@oldfriends.live avatar

North Korean hackers crack DMARC to spoof emails from trusted sources

North Korean state-sponsored threat actors are abusing misconfigurations in DMARC to send convincing phishing emails and gather vital intelligence from Western targets~impersonating journalists, officials have warned.

#infosec #hacking #security

https://www.techradar.com/pro/security/north-korean-hackers-crack-dmarc-to-spoof-emails-from-trusted-sources

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

A (Strange) Interview the Russian-Military-Linked Hackers Targeting US Water Utilities https://www.wired.com/story/cyber-army-of-russia-interview/?utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

Microsoft developed an ‘air-gapped’ AI for spies that’s isolated from the internet https://qz.com/microsoft-offline-ai-service-chatgpt-gpt4-us-spies-1851462266?utm_source=dlvr.it&utm_medium=mastodon

andre, to sysadmin
@andre@fedi.jaenis.ch avatar

I'm trying to wrap my head around security aspects of IPv6 protocol.

From what I've learned that now my networking devices have a public IP address (unlike with IPv4 which would have to be port translated at the router).

In order to talk to a service I still will need a port next to the IP address.

Does that mean that every device in the network should have a firewall? Or can I still have one at the router level handle everything?

My fear is that a router could be easily bypassed.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

UK Ministry of Defence Suffers Major Data Breach, China’s Involvement Suspected https://thecyberexpress.com/uk-ministry-of-defence-data-breach/?utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

tech, to tech
@tech@unfufadoo.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
cigitalgem, to ai
@cigitalgem@sigmoid.social avatar

CalypsoAI produced a video for RSA abojut #MLsec #AI #ML #security #infosec #LLM

Watch as I interview Jim Routh and Neil Serebryany.

https://berryvilleiml.com/2024/05/10/video-interview-a-deep-dive-into-generative-ai-and-cybersecurity/

smach, to LLMs
@smach@masto.machlis.com avatar

“The general problem of mixing data with commands is at the root of many of our computer security vulnerabilities.” Great explainer by security researcher Bruce Schneier on why large language models may not be a great choice for tasks like processing your emails.
https://cacm.acm.org/opinion/llms-data-control-path-insecurity/

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
chiefgyk3d, to python
@chiefgyk3d@social.chiefgyk3d.com avatar

I was up late trying to figure out a stupid issue I was having with the Crowdstrike API so I didn't stream on twitch last night, hoping to do a stream tonight. I think they took a feature out my team was actually using which would allow me to contain a device and make a note that could be viewed in the dashboard.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
north, to Cybersecurity
@north@xn--8r9a.com avatar

I'll give this a shot.

I'm looking to #GetFediHired for a role in #cybersecurity. I've done both offensive (see e.g. https://github.com/qwell/disclosures/) and defensive security work, and have over 20 years of software development experience in many different languages.

ISC2 CC

DMs always open.

#FediHire #FediHired (we should pick a hashtag and stick with it) #InfoSec

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • khanakhh
  • mdbf
  • InstantRegret
  • Durango
  • Youngstown
  • rosin
  • slotface
  • thenastyranch
  • osvaldo12
  • ngwrru68w68
  • kavyap
  • cisconetworking
  • DreamBathrooms
  • megavids
  • magazineikmin
  • cubers
  • vwfavf
  • modclub
  • everett
  • ethstaker
  • normalnudes
  • tacticalgear
  • tester
  • provamag3
  • GTA5RPClips
  • Leos
  • JUstTest
  • All magazines