redhotcyber, to IT Italian
@redhotcyber@mastodon.bida.im avatar
julie, to Cybersecurity

Super weird to me that Dropbox has told Dropbox Sign customers to "delete your existing entry and then reset it" if they use app-based MFA. I have never seen "delete your MFA and create new tokens" in post-compromise account hygiene advice before.

I suspect two things:
1.) Dropbox was storing plain text MFA seeds right next to their password hashes
2.) We're going to hear a lot more about this soon.

ref: https://sign.dropbox.com/blog/a-recent-security-incident-involving-dropbox-sign

alexandreborges, to security
@alexandreborges@mastodon.social avatar
LukaszOlejnik, to Cybersecurity
@LukaszOlejnik@mastodon.social avatar

My book 'PROPAGANDA: from disinformation and influence to operations and information warfare' treats the subject adequately, comprehensively, broadly, expertly. Information surrounds us. How does information influence work? An expert arrangement of the subject. https://blog.lukaszolejnik.com/propaganda-my-book-on-information-security/

#book #mybook #cybersecurity #propaganda #author #disinformation #informationsecurity

redhotcyber, to IT Italian
@redhotcyber@mastodon.bida.im avatar
julie, to Cybersecurity

Security folks, I need some help. My wife is looking for a job after taking a few years off to take care of the kids and she's having a hard time finding legit security opportunities. And the legit ones she does find don't like the gap in her resume.

If you have or know of any legit remote openings for someone with experience in identity and access management, can you please share?

She has her CISSP and while most of her experience is in IAM she's willing to branch out and learn a new specialty. She also happens to be both the faster learner and the smarter one of the two of us!

Boosts greatly appreciated!

redhotcyber, to Symfony Italian
@redhotcyber@mastodon.bida.im avatar

Adobe Magneto: una pericolosa minaccia RCE per i siti di e-commerce

Gli specialisti di Sicurezza Informatica hanno avvertito che gli stanno già sfruttando una nuova in (CVE-2024-20720) e l'utilizzatore per implementare una persistente sui siti di e-commerce.

https://www.redhotcyber.com/post/adobe-magneto-una-pericolosa-rce-minaccia-i-siti-di-e-commerce/

blueghost, to infosec
@blueghost@mastodon.online avatar

The 3-2-1 rule is a data backup strategy.

3 copies of the data.
2 different types of storage media.
1 copy located offsite.

Consider protecting each backup with encryption.
Consider "Harvest now, decrypt later" when selecting a storage location.

Backup: https://en.wikipedia.org/wiki/Backup
Encryption: https://en.wikipedia.org/wiki/Encryption
Harvest now, decrypt later: https://mastodon.online/@blueghost/111357939714657018

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Heads up, developers! Hackers are targeting crypto wallets with sneaky PyPI packages. Thousands of downloads already affected. Check your dependencies!

https://thehackernews.com/2024/03/watch-out-these-pypi-python-packages.html

#informationsecurity #cybersecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🔒Protecting data in the cloud requires a new approach. Discover why browser-based DLP is the key to securing corporate data online.

Get insights from LayerX's comprehensive guide:
https://thehackernews.com/2024/03/data-leakage-prevention-in-age-of-cloud.html

#cybersecurity #informationsecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🤖 Think LLMs are foolproof? Think again! Hackers are exploiting them to steal sensitive data. Protect yourself – learn the latest LLM security risks and how to defend against them.

https://thehackernews.com/2024/02/three-tips-to-protect-your-secrets-from.html

#cybersecurity #informationsecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨 #LockBit #ransomware operators are back online after a law enforcement takedown, blaming outdated software for the breach.

They are now calling for increased attacks on the government sector.

https://thehackernews.com/2024/02/lockbit-ransomware-group-resurfaces.html

#cybersecurity #informationsecurity

ralb, to privacy
@ralb@privacyofficers.social avatar

News about significant data breaches appear to break on a daily basis now. Yet some (business) people still give me strange looks when I tell them that the best way to protect data is to not have it stored. 🙄 You can‘t lose what you don‘t have. It‘s that simple. 🤷‍♂️

#privacy #DataProtection #GDPR #InfoSec #InformationSecurity #DataBreach #DataBreaches

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

A new Russia-aligned influence operation is targeting Ukraine with disinformation campaigns and credential-harvesting attacks.

https://thehackernews.com/2024/02/russian-hackers-target-ukraine-with.html

#informationsecurity #technews #cybersecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Legacy systems + no security pro = open doors for hackers.

#Ransomware, phishing, state actors... #Healthcare data is gold for criminals. See the alarming stats & why your defenses need an overhaul.

https://thehackernews.com/2024/02/cybersecurity-for-healthcarediagnosing.html

#cybersecurity #informationsecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Did you know? 25% of SaaS is underutilized or over-deployed.

Nudge Security offers automated workflows to manage access, ensure compliance, streamline offboarding, and optimize costs.

https://thehackernews.com/2024/02/6-ways-to-simplify-saas-identity.html

#cybersecurity #informationsecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

#Cybersecurity breaches are no longer just headlines for big corporations. SMBs are on the front lines. Find out how
NTTSHGlobal
is leading the charge to democratize cybersecurity.

https://thehackernews.com/2024/02/why-we-must-democratize-cybersecurity.html

#informationsecurity

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

🔐 Legacy accounts, bad OAuth hygiene—how major companies get hacked. Nation-state actors are exploiting flaws in common SaaS management.

Security can't be on auto-pilot. Find out how to improve your SaaS security posture: https://thehackernews.com/2024/02/midnight-blizzard-and-cloudflare.html

#informationsecurity #technews

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨 Bumblebee, #QakBot, Zloader, & #PikaBot are back, targeting U.S. organizations with sophisticated phishing tactics.

https://thehackernews.com/2024/02/bumblebee-malware-returns-with-new.html

Be wary of suspicious emails or downloads – these threats are sneakier than ever.

#cybersecurity #informationsecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

#PikaBot #malware undergoes a dramatic transformation, simplifying its code and communication methods.

https://thehackernews.com/2024/02/pikabot-resurfaces-with-streamlined.html

#cybersecurity #informationsecurity

InfoSecSherpa, to random

InfoSecSherpa's #DataPrivacy and #InformationSecurity News Roundup for Monday, February 12, 2024

Features the Infosecurity Magazine article by Alessandro Mascellino, "Sophisticated Cyber-Attack Hits Islamic Charity in Saudi Arabia."

https://infosecsherpa.medium.com/infosecsherpas-news-roundup-for-monday-february-12-2024-03faf61e0fca

InfoSecSherpa, to random

InfoSecSherpa's and News Roundup for Saturday, February 10, 2024 🇫🇷​

Features the ITPro article by Emma Woollacott, "Two massive healthcare data breaches just exposed more than half of France's population."

https://infosecsherpa.medium.com/infosecsherpas-news-roundup-for-saturday-february-10-2024-d6aa77ab0f5e

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🛑 Urgent: Patch it now - Hackers are exploiting it!

Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.

https://thehackernews.com/2024/02/fortinet-warns-of-critical-fortios-ssl.html

#cybersecurity #hacking #informationsecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨 New backdoor called Zardoor used in #cyberattack on Saudi Islamic charity, stealing data for over 2 years. Hackers use everyday tools like WMI to move undetected.

https://thehackernews.com/2024/02/stealthy-zardoor-backdoor-targets-saudi.html

#cybersecurity #hacking #informationsecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Stop chasing false alarms! Myrror prioritizes vulnerabilities by impact, not noise. Focus on what truly matters & defend against supply chain attacks.

https://thehackernews.com/2024/02/hands-on-review-myrror-security-code.html

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • rosin
  • InstantRegret
  • ethstaker
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • thenastyranch
  • Youngstown
  • everett
  • slotface
  • osvaldo12
  • khanakhh
  • kavyap
  • anitta
  • Durango
  • vwfavf
  • GTA5RPClips
  • cubers
  • tacticalgear
  • tester
  • cisconetworking
  • ngwrru68w68
  • Leos
  • normalnudes
  • provamag3
  • modclub
  • JUstTest
  • All magazines