kramse, to hacking
@kramse@social.kramse.org avatar

So I have a presentation tonight, and thought I would promote BornHack a bit @bornhack

It is a very nice, cozy, HYGGE camp in Denmark July 17-24. You should consider it if you need a break from the outside world.

I looked these pictures I took of my camp, and associated KEA tent from last year. It sums up the camp for me, sleeping tent, working tent, serious tent and when the night falls, music and lights

You should come too!
https://bornhack.dk/bornhack-2024/

Night time, small tent space with LED lights, music is definitely on!
Tent with a work space, table, monitor and a lot of mess around the space

tempo,
@tempo@radikal.social avatar

@siggi @kramse @bornhack has already been there for months ;)

https://dukop.dk/6318/

benjaoming,
@benjaoming@social.data.coop avatar

@tempo @siggi @kramse @bornhack Is there a Bornhack illustration that has a bit more of a "poster" feel than a standalone logo?

Maybe put the logo on top of one of the photos from https://www.instagram.com/bornhax/ ?

redhotcyber, to Software Italian
@redhotcyber@mastodon.bida.im avatar

Attacco agli ATM riuscito! Un Tasso del 99% di Efficacia Spaventa tutte le Banche Europee

Nello spazio si sta diffondendo attivamente un nuovo tipo di . Il suo tasso di successo, secondo i suoi autori, raggiunge il 99%.

Questo dannoso, chiamato “EU ATM Malware”, è in grado di quasi tutti gli sportelli in e circa il 60% degli sportelli bancomat in tutto il mondo, il che rappresenta una significativa per la sicurezza bancaria globale..

https://www.redhotcyber.com/post/attacco-agli-atm-riuscito-un-tasso-del-99-di-efficacia-spaventa-tutte-le-banche-europee/

phil, to infosec

Looking for an entry-level #InfoSec or #CyberSec job.

Just spent a week grinding through THM, got some certs out of it... are these any good? I don't know, but I have learned a bunch of interesting things.

Haven't had a job since December, and I'm nearing on 7 months here. I'll take anything that's remote.

I learn fast, I'm diligent, and I don't take shortcuts.
I grok computers good.

Anyone, anything?

#fedihire #forhire #jobs #jobsearch #job #jobseeker #hireme #cybersecurityjobs #cybersecurity #infosecjobs #informationsecurity

(Sorry for spamming the tags, I know it's bad form.)

grb090423, to Bulgaria
@grb090423@mastodon.social avatar
redhotcyber, to Wisconsin Italian
@redhotcyber@mastodon.bida.im avatar
redhotcyber, to IT Italian
@redhotcyber@mastodon.bida.im avatar
julie, to Cybersecurity

Super weird to me that Dropbox has told Dropbox Sign customers to "delete your existing entry and then reset it" if they use app-based MFA. I have never seen "delete your MFA and create new tokens" in post-compromise account hygiene advice before.

I suspect two things:
1.) Dropbox was storing plain text MFA seeds right next to their password hashes
2.) We're going to hear a lot more about this soon.

ref: https://sign.dropbox.com/blog/a-recent-security-incident-involving-dropbox-sign

alexandreborges, to security
@alexandreborges@mastodon.social avatar
LukaszOlejnik, to Cybersecurity
@LukaszOlejnik@mastodon.social avatar

My book 'PROPAGANDA: from disinformation and influence to operations and information warfare' treats the subject adequately, comprehensively, broadly, expertly. Information surrounds us. How does information influence work? An expert arrangement of the subject. https://blog.lukaszolejnik.com/propaganda-my-book-on-information-security/

#book #mybook #cybersecurity #propaganda #author #disinformation #informationsecurity

stf,
@stf@chaos.social avatar

@LukaszOlejnik i'm sorry, but when the author says about their own content:

> treats the subject adequately, comprehensively, broadly, expertly.

i have a weird feeling, i mean if this is a quote from an independent expert in the field, that is awesome, but without attribution? really awkward....

LukaszOlejnik,
@LukaszOlejnik@mastodon.social avatar

@stf Well, I know how I wrote the book - the thing is that I used references through the book, so it is based on sources. And obviously the sentence is "in my view/opinion", since I said that. Would it sound better to you if I spoke negatively about my work? :-)

redhotcyber, to IT Italian
@redhotcyber@mastodon.bida.im avatar
julie, to Cybersecurity

Security folks, I need some help. My wife is looking for a job after taking a few years off to take care of the kids and she's having a hard time finding legit security opportunities. And the legit ones she does find don't like the gap in her resume.

If you have or know of any legit remote openings for someone with experience in identity and access management, can you please share?

She has her CISSP and while most of her experience is in IAM she's willing to branch out and learn a new specialty. She also happens to be both the faster learner and the smarter one of the two of us!

Boosts greatly appreciated!

redhotcyber, to Symfony Italian
@redhotcyber@mastodon.bida.im avatar

Adobe Magneto: una pericolosa minaccia RCE per i siti di e-commerce

Gli specialisti di Sicurezza Informatica hanno avvertito che gli #hacker stanno già sfruttando una nuova #vulnerabilità in #Magento (CVE-2024-20720) e l'utilizzatore per implementare una #backdoor persistente sui siti di e-commerce.

#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity

https://www.redhotcyber.com/post/adobe-magneto-una-pericolosa-rce-minaccia-i-siti-di-e-commerce/

informapirata,
@informapirata@mastodon.uno avatar

@redhotcyber magari Adobe Magento...

🧲 ≠ 🟥

blueghost, to infosec
@blueghost@mastodon.online avatar

The 3-2-1 rule is a data backup strategy.

3 copies of the data.
2 different types of storage media.
1 copy located offsite.

Consider protecting each backup with encryption.
Consider "Harvest now, decrypt later" when selecting a storage location.

Backup: https://en.wikipedia.org/wiki/Backup
Encryption: https://en.wikipedia.org/wiki/Encryption
Harvest now, decrypt later: https://mastodon.online/@blueghost/111357939714657018

#Data #Backup #DataBackup #DataStorage #Encryption #InfoSec #InformationSecurity

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Heads up, developers! Hackers are targeting crypto wallets with sneaky PyPI packages. Thousands of downloads already affected. Check your dependencies!

https://thehackernews.com/2024/03/watch-out-these-pypi-python-packages.html

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🔒Protecting data in the cloud requires a new approach. Discover why browser-based DLP is the key to securing corporate data online.

Get insights from LayerX's comprehensive guide:
https://thehackernews.com/2024/03/data-leakage-prevention-in-age-of-cloud.html

#cybersecurity #informationsecurity

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines