Replies

This profile is from a federated server and may be incomplete. Browse more on the original instance.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon,
@percepticon@ioc.exchange avatar

@d3tm4r yeah, doesn’t feel right. Maybe something peculiar with the methodology. Looking at CVE 2023 was not as bad as 2022, but still worse than the most years before and the year still has a month left for catching up.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

The NSA Seems Pretty Stressed About the Threat of Chinese Hackers in US Critical Infrastructure https://www.wired.com/story/nsa-china-hacking-criticial-us-infrastructure/?utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

percepticon,
@percepticon@ioc.exchange avatar

@rysiek I hear ya. coming from the social sciences , there is always the problem that media actors are using established terminology wrong. But unfortunately it is likely not going away as social discourses are complex. You train one generation to use it right and the next has already forgotten, basically

percepticon, to random
@percepticon@ioc.exchange avatar

I just read the amazing blog post on #hacktivism during the #kosovo war by @realhackhistory There are a lot of interesting parallels to today, whether in Ukraine or Israel. Really cool blog project about the history of hacking: https://realhackhistory.org/2023/07/16/first-international-hacktivist-cyberwar-online-conflict-the-kosovo-war/

percepticon,
@percepticon@ioc.exchange avatar

@realhackhistory looking forward to reading the other pieces! True detective work :)

percepticon, to Cybersecurity German
@percepticon@ioc.exchange avatar
percepticon,
@percepticon@ioc.exchange avatar
evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

Ist zwar etwas seltsam geschnitten, dennoch empfehle ich euch den neuen Podcast "Aus Politik und Zeitgeschichte" zu Cybersecurity. Ich erkläre dort ua mal wieder, wieso der Mensch meist weniger das Problem ist, als jene Unternehmen behaupten, die technische IT-Sicherheit ernster nehmen sollten. Merke: Awareness-Training ist ein Pflaster, das viel zu klein ist für die Sicherheitslücken, die manche Unternehmen offen lassen.

https://www.bpb.de/mediathek/podcasts/apuz-podcast/542300/apuz-22-cybersicherheit/

percepticon,
@percepticon@ioc.exchange avatar

@evawolfangel @anneroth @qbi jetzt habt ihr mich neugierig gemacht. Ich höre nachher mal rein, vielleicht kann man was lernen :)

percepticon,
@percepticon@ioc.exchange avatar

@anneroth @evawolfangel @qbi mein Name ist Hase :)

percepticon, to Cybersecurity German
@percepticon@ioc.exchange avatar
percepticon,
@percepticon@ioc.exchange avatar

@fr33d0m3 the beaching yes, the announcing no :)

percepticon, to Cybersecurity German
@percepticon@ioc.exchange avatar
percepticon,
@percepticon@ioc.exchange avatar

@fredbrooker yes, but who isn’t?

percepticon, to Cybersecurity German
@percepticon@ioc.exchange avatar
percepticon,
@percepticon@ioc.exchange avatar

@pyperkub everything comes back!

percepticon, to Cybersecurity German
@percepticon@ioc.exchange avatar
percepticon,
@percepticon@ioc.exchange avatar

@Hawkwinter since do traffic injection at the ISP level I guess it is pretty hard to defend against

percepticon, to random German
@percepticon@ioc.exchange avatar

The recent #intellexa #predator revelations show why it is a terrible idea to punch holes in communication standards or to rely on weak ones. The toolkit includes #Triton, a suite to downgrade 5G/4G connections to older 2G connections, thereby exploiting vulnerabilities in them. https://www.darkreading.com/endpoint/operation-behind-predator-mobile-spyware-industrial-scale

percepticon,
@percepticon@ioc.exchange avatar

@larsborn True. Pretty sure that their other product names like Mars und Jupiter are in use somewhere else too :)

percepticon, to Cybersecurity German
@percepticon@ioc.exchange avatar

auf die Kleine Anfrage - Drucksache 20/8158 - Cyberkriegsführung und Cyberkriegsverteidigung: rechtliche, organisatorische und politische Aspekte (PDF) https://dserver.bundestag.de/btd/20/085/2008515.pdf?utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

percepticon,
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity German
@percepticon@ioc.exchange avatar
percepticon,
@percepticon@ioc.exchange avatar

@sophietkd sure. I guess these prices are more for state-based buyers such as law enforcement /intelligence actors

cyberpeace1, to random German

Wenn im Regionalzug zw. Hamburg und Lübeck das mobile Netz mehrfach von 5G auf Edge abstürzt muss ich immer ein bisschen weinen

(ist ja nicht so, das hier täglich Zehntausende zw. Stadt und Umland pendeln würden)

percepticon,
@percepticon@ioc.exchange avatar

@cyberpeace1 Zwischen Potsdam und Berlin gibts ein Funkloch in allen Netzen, irgendwo Anfang Grunewald. Deutschlands meistgenutzte Pendlerstrecke... I feel ya

cyberpeace1, to random German

YEAH!! Thanks to everyone that joined this long way for your support!

percepticon,
@percepticon@ioc.exchange avatar

@cyberpeace1 well deserved ! Mad respect for achieving this!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • GTA5RPClips
  • tacticalgear
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • ethstaker
  • anitta
  • provamag3
  • Leos
  • cisconetworking
  • lostlight
  • All magazines