social.dk-libre.fr is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Search results for tag #infosec

Debacle boosted

[?]TechnoTenshi :verified_trans: :Fire_Lesbian: [She/Her] » 🌐
@technotenshi@infosec.exchange

The FTC said OkCupid and Match shared nearly 3 million user photos with Clarifai in 2014, along with location and demographic data, without telling users or offering an opt-out. The proposed settlement, filed in federal court, includes no financial penalty and no admission of wrongdoing. It would permanently bar OkCupid and Match from misrepresenting how they collect, use, share, delete, or protect personal data and privacy controls.

arstechnica.com/tech-policy/20

    DamonHD boosted

    [?]Jonathan Kamens 86 47 » 🌐
    @jik@federate.social

    This is alarming but not surprising:
    forbes.com/sites/the-wiretap/2
    TLDR If you access multiple Google accounts from the same device, and the cops know about one of the accounts and ask Google the right questions, Google will tell the cops about the other accounts.
    The general lesson here is one we already know: if you have any sort of account you don't want linked to you, you can't ever access it from a device or network connection you use other accounts on.
    Caveat usor.

      [?]Jonathan Kamens 86 47 » 🌐
      @jik@federate.social

      Three observations about ( hackers) getting into 's Gmail account (ref: techcrunch.com/2026/03/27/iran):
      1) It is not unusual for govt employees to forward emails from govt to personal accounts, e.g., personal emails inappropriately sent to govt accounts. We would have to know what emails were forwarded to know if there was a problem. Presumably if the forwarded emails were problematic the journalists reporting on this would have reported that?
      (1/3)

        AodeRelay boosted

        [?]Paul Chambers🚧 » 🌐
        @paul@oldfriends.live

        Another round of scammers. Beware of Scammers Claiming to be Ohio Bureau of Motor Vehicles texting you saying you owe a ticket and to pay or lose your license immediately. The was really bad in the summer of 2025.

        The Bureau of Motor Vehicles (BMV) has received reports of a possible texting scam being perpetrated on Ohioans today from scammers claiming to be from the State of Ohio.

        Residents have reported receiving text messages from scammers informing the recipients that they have an outstanding parking ticket. The text then instructs the recipient to pay immediately to avoid a license suspension. This particular scam is a phishing attempt that is being reported by drivers nationwide and is designed to trick residents into giving up personal or financial information.

        “If you receive this text, do not fall for this scam,” said Ohio BMV Registrar Charlie Norman. “Do not click any links, do not scan the QR code, and immediately delete the text. Ohio BMV will never send you a text demanding payment or requesting your personal information.”

        For Immediate Release: March 6, 2026

scam image
Beware of Scammers Claiming to be Ohio Bureau of Motor Vehicles
(COLUMBUS, Ohio) – The Ohio Bureau of Motor Vehicles (BMV) has received reports of a possible texting scam being perpetrated on Ohioans today from scammers claiming to be from the State of Ohio.

Residents have reported receiving text messages from scammers informing the recipients that they have an outstanding parking ticket. The text then instructs the recipient to pay immediately to avoid a license suspension. This particular scam is a phishing attempt that is being reported by drivers nationwide and is designed to trick residents into giving up personal or financial information.

“If you receive this text, do not fall for this scam,” said Ohio BMV Registrar Charlie Norman. “Do not click any links, do not scan the QR code, and immediately delete the text. Ohio BMV will never send you a text demanding payment or requesting your personal information.”

        Alt...For Immediate Release: March 6, 2026 scam image Beware of Scammers Claiming to be Ohio Bureau of Motor Vehicles (COLUMBUS, Ohio) – The Ohio Bureau of Motor Vehicles (BMV) has received reports of a possible texting scam being perpetrated on Ohioans today from scammers claiming to be from the State of Ohio. Residents have reported receiving text messages from scammers informing the recipients that they have an outstanding parking ticket. The text then instructs the recipient to pay immediately to avoid a license suspension. This particular scam is a phishing attempt that is being reported by drivers nationwide and is designed to trick residents into giving up personal or financial information. “If you receive this text, do not fall for this scam,” said Ohio BMV Registrar Charlie Norman. “Do not click any links, do not scan the QR code, and immediately delete the text. Ohio BMV will never send you a text demanding payment or requesting your personal information.”

          [?]GreyNoise » 🌐
          @greynoise@infosec.exchange

          NEW: GreyNoise At The Edge Intel Brief (March 23-30)

          187,998,900 sessions from 100 top source IPs observed by GreyNoise sensors between March 23-30, 2026. Daily volumes surged 4x mid-week — from 8.5M to 36.6M in 72 hours.

          1. VPSVAULT IoT botnet recruitment across 22 CVEs — 3,347,443 sessions from 4 Brazilian IPs targeting Hikvision, MikroTik, TP-Link, D-Link devices. Includes CVE-2026-24061, now on CISA KEV.

          2. VisionHeight fleet of 6 AWS IPs generated 5,892,055 sessions mapping enterprise perimeters across Palo Alto, Sophos, Ivanti, Citrix, F5, and ConnectWise — probing CVE-2024-1709 (CVSS 10.0).

          3. React/Next.js exploit chaining (CVE-2025-55182 + CVE-2025-29927) produced 1,338,336 sessions, with attackers spoofing GoogleBot user-agents to bypass detection.

          4. At least 4 new scanning operations activated simultaneously mid-week, driving the sharp volume surge across the observation period.

          Here's what we found: 🔗 greynoise.io/resources/at-the-

            AodeRelay boosted

            [?]Neil Craig [He/Him] » 🌐
            @tdp_org@mastodon.social

            "...two malicious versions of the widely used axios HTTP client library published to npm: axios@1.14.1 and axios@0.30.4...[which installs] a `postinstall` script that acts as a cross platform remote access trojan (RAT) dropper, targeting macOS, Windows, and Linux"

            My `package.json` files across 4 projects:
            ```
            "axios": "1.14.0"
            ```

            stepsecurity.io/blog/axios-com

            Screenshot of the film Snatch.
Vinnie Jones' character is holding a gun and standing over a man who's cowering in fear against a wall.
The gun has just failed to work when Jones tried to shoot the man. 
Jones says "You lucky bastard" and walks away.

            Alt...Screenshot of the film Snatch. Vinnie Jones' character is holding a gun and standing over a man who's cowering in fear against a wall. The gun has just failed to work when Jones tried to shoot the man. Jones says "You lucky bastard" and walks away.

              Debacle boosted

              [?]Brian Greenberg :verified: » 🌐
              @brian_greenberg@infosec.exchange

              🤣 A robot in a restaurant in California decided that smashing plates was more fun than delivering food, then it pivoted to jazz hands all the while two staff members tried to wrestle it back under control. Its apron said "I'M GOOD!" 🤖 It’s crazy to think that we’re putting hardware (robots) with enough power to knock a kid down or take out unaware bystanders. We have a product culture that moves too fast and don't ask important, yet simple questions.

              The video is funny right up until you picture a five-year-old standing where those plates were.

              Nobody got hurt this time. But the reason to think carefully about physical AI deployment isn't the dramatic failure. It's the hundred smaller decisions made before the robot ever left the warehouse that make the failures possible.

              gizmodo.com/robot-losing-its-m

                Debacle boosted

                [?]Brian Greenberg :verified: » 🌐
                @brian_greenberg@infosec.exchange

                First, Discord announced age verification. As predicted, users revolted. A former partner had already leaked 70,000 government IDs. Then, Discord backed down. And now the age-check vendors who got exposed in the process have to defend technology most people didn't even know existed. Interestingly, researchers at Georgia Tech reverse-engineered Yoti, the dominant age-check provider used on over 60% of compliant sites in states with age-gate laws. They found that Yoti sends your photo to its servers, collects data "beyond what is strictly necessary," and shares it with fourth parties most users have never heard of. Yoti disputes it. But they also confirmed facial age estimation does not happen on-device. Meanwhile, the EFF states that on-device processing is "less dangerous" than sending data over a network.

                🔐 On-device face scans mean your biometric data stays on your phone, for now
                🗝️ "Age keys" built on FIDO passkey tech could let you reuse an age signal across platforms without re-verifying each time
                📸 The dominant provider in the US runs a million checks a day and sends your photo to its servers
                ⚖️ The Supreme Court ruled last summer that online age verification doesn't violate the First Amendment, partly based on Yoti's technical claims 😳

                The thing people don’t realize is that once age-check infrastructure is embedded across every major platform, it doesn't go away. Every update is a new attack surface. Every new law expands the mandate. And the CEO of one of these companies is already talking about age-aware cameras and microphones as the logical next step.

                Your device should work for ‘you.’ The moment it starts working for someone else's compliance requirement, that's a different product than the one you thought you had.

                arstechnica.com/tech-policy/20

                  [?]Blue Ghost » 🌐
                  @blueghost@mastodon.online

                  AodeRelay boosted

                  [?]TechnoTenshi :verified_trans: :Fire_Lesbian: [She/Her] » 🌐
                  @technotenshi@infosec.exchange

                  Sam Bent reports the White House app v47.0.1 requests 26 Android permissions, including precise location, biometric authentication, storage changes, startup, overlay, and Wi-Fi access, and embeds 3 trackers including Huawei Mobile Services Core. The piece also says the app includes an ICE tip line link and a "Text the President" feature that prefills "Greatest President Ever!" while collecting contact details. More broadly, the article compares permissions and trackers across U.S. government apps including FEMA, myFBI Dashboard, IRS2Go, and CBP Mobile Passport Control and argues many functions could be delivered via the web instead of mobile apps.

                  sambent.com/the-white-house-ap

                    AodeRelay boosted

                    [?]Areeb Soo Yasir » 🌐
                    @Areeb_Soo_Yasir@mastodon.areebyasir.com

                    AodeRelay boosted

                    [?]MissConstrue [She/Her (Crone Extraordinaire)] » 🌐
                    @MissConstrue@mefi.social

                    blog.thereallo.dev/blog/decomp

                    Wowy wow wow wow! I’m sure none of y’all planned on downloading the malware from the Mango, but just in case, DO NOT. It will:

                    Inject JavaScript into every website you open

                    Has a full GPS tracking pipeline always on.

                    Loads JavaScript from a random person's GitHub Pages site (lonelycpp.github.io) for YouTube embeds.

                    Loads third-party JavaScript from Elfsight (elfsightcdn.com/platform.js) for social media widgets, with no sandboxing.

                    Sends email addresses to Mailchimp, images are served from Uploadcare, and a Truth Social embed is hardcoded with static CDN URLs. None of this is government infrastructure.

                    Has no certificate pinning.

                    Ships with dev artifacts in production.

                    Profiles users extensively through OneSignal - tags, SMS numbers, cross-device aliases, outcome tracking, notification interaction logging, in-app message click tracking, and full user state observation

                      [?]Julian Oliver » 🌐
                      @JulianOliver@mastodon.social

                      That should get you PQC resistance (to the best of our knowledge) while ensuring Android & iOS apps can TLS to your service, alongside browsers.

                      If you solely roll with the X25519MLKEM768 hybrid group, you'll have no worries in ~96% browsers, but will break for some apps.

                      Remember you can override with 'ssl_protocols TLSv1.2 TLSv1.3;' for sites for which quantum resistance isn't critical (static sites, no auth).

                      Be sure to also test at SSL Labs & the above PQC domain checker

                      2/2

                        [?]AmmarSpaces » 🌐
                        @AmmarSpaces@infosec.exchange

                        ... [SENSITIVE CONTENT]

                        Looks like defcon.social getting flooded by targetted defamation towards @briankrebs . I still haven't found the context.

                        Anyone has more info on this?

                        @defcon
                        @support

                        defcon.social account flood

                        Alt...defcon.social account flood

                          ClaudioM boosted

                          [?]Shawn Webb [He/Him] » 🌐
                          @lattera@bsd.network

                          And now linux.org has been defaced. This kinda reminds me of the old defacement crews of the mid-to-late 1990's like Hackweiser and World of Hell.

                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                            @Steve12L@mamot.fr

                            ⋅ Détentions d’armes : un pirate exfiltre des données du SIA (ministère de l’Intérieur)

                            next.ink/231423/detentions-dar

                              [?]Hyde 📷 🖋 :debian: » 🌐
                              @hyde@lazybear.social

                              059 with @rysiek.

                              Today, he shares his thoughts on , , , , and .

                              He also replied to @brennan's question.

                              He suggested two books that I'll try to get.

                              lazybea.rs/ovr-059

                                opio ⏚ boosted

                                [?]Edwin G. :mapleleafroundel: [he/him/il/lui] » 🌐
                                @EdwinG@mstdn.moimeme.ca

                                Paco Hope boosted

                                [?]užmiršta » 🌐
                                @uzmirsta@river.group.lt

                                hey, doing an
                                k. kinija, kinija is my real last name. yes, it means china in lithuanian, i've heard every joke
                                i'm from lithuania, do independent security research and reverse engineering, code in C++ and rust, poke at open source stuff
                                pretty privacy focused
                                also i have a music problem. i listen to (almost) anything, even "human music" from rick and morty
                                i'll probably post my head out, a-z, but at the same time i'm awfully bad at placing my thoughts
                                anyway hi

                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                  @Steve12L@mamot.fr

                                  Avec Fortinet, t'as l'air tout bête !

                                  ⋅ Fortinet, une faille critique activement exploitée dans FortiClient EMS menace des milliers de serveurs

                                  clubic.com/actualite-606889-fo

                                    [?]FlohEinstein » 🌐
                                    @FlohEinstein@chaos.social

                                    Working on another sticker for - found this image a while ago, but only as a lowres jpg, so I re-did it as a vector graphic.


                                    We do not test on animals, we test in production.

                                    EDIT: Here's the SVG for all of you who asked blog.kohler.is/sticker-we-do-n

                                    A green no parking sign with the inscription we do not test on animals we test in production showing a bunny, a red heart and a stack of servers going up in flames

Original idea found on https://www.reddit.com/r/ProgrammerHumor/comments/z1z43b/ive_made_a_new_sticker_so_your_projects_has_no by u/AlFlakky (AlexBlintsov)
Used sources from Flaticon.com: Star Icons by Pixel perfect, Hase by torskaya, hacken by juicy_fish, dedizierter Server by Design Circle, Herz by IconBaandar

                                    Alt...A green no parking sign with the inscription we do not test on animals we test in production showing a bunny, a red heart and a stack of servers going up in flames Original idea found on https://www.reddit.com/r/ProgrammerHumor/comments/z1z43b/ive_made_a_new_sticker_so_your_projects_has_no by u/AlFlakky (AlexBlintsov)
Used sources from Flaticon.com: Star Icons by Pixel perfect, Hase by torskaya, hacken by juicy_fish, dedizierter Server by Design Circle, Herz by IconBaandar

                                      AodeRelay boosted

                                      [?]FlohEinstein » 🌐
                                      @FlohEinstein@chaos.social

                                      Wow, u/DeeZett made a 3D version of my "We do not test on animals, we test in production" sticker. I love it!

                                      Reddit: reddit.com/r/3Dprinting/commen
                                      Model on Makerworld: makerworld.com/en/models/25874
                                      Thing on Thingiverse: thingiverse.com/thing:7323159

                                      A green no parking sign with the inscription we do not test on animals we test in production showing a bunny, a red heart and a stack of servers going up in flames
3D printed in bright green (sign), white (inscription, bunny, inner flame), red (heart, flame) and black (servers).

                                      Alt...A green no parking sign with the inscription we do not test on animals we test in production showing a bunny, a red heart and a stack of servers going up in flames 3D printed in bright green (sign), white (inscription, bunny, inner flame), red (heart, flame) and black (servers).

                                        Fred de CLX boosted

                                        [?]Brian Greenberg :verified: » 🌐
                                        @brian_greenberg@infosec.exchange

                                        I teach cybersecurity. And I genuinely don't know what to tell my students after this one. Federal reviewers spent years trying to get basic encryption documentation from Microsoft for its GCC High government cloud. They couldn't get it. One reviewer called the system a "pile of spaghetti pies," with data traveling from point A to point B the way you'd get from Chicago to New York: a bus to St. Louis, a ferry to Pittsburgh, and a flight to Newark. Each leg is a potential hijacking. They knew this. They said this out loud in writing. Then they approved it anyway in December 2024, because too many agencies were already using it. 🔐 That's not a security review. That's a hostage negotiation. Two things in this story should make every CISO and CIO uncomfortable:

                                        🧩 Microsoft built its federal cloud on top of decades of legacy code that it apparently can't fully document itself
                                        👮 "Digital escorts" often ex-military with minimal software engineering backgrounds are the firewall between Chinese engineers working on the system and classified U.S. networks 🤦🏻‍♂️

                                        The scariest line in the whole ProPublica investigation isn't the "pile of shit" quote. It's this: FedRAMP determined that refusing authorization wasn't feasible because agencies were already using the product. Read that again. The security review process reached a conclusion based on sunk cost, not risk. Ex Post Facto Fallacy

                                        If that logic holds, the compliance framework is just documentation theater. And right now, CISA is being hollowed out, so there are fewer people left to even run the theater.

                                        arstechnica.com/information-te

                                          [?]sͧb̴ͫƸ̴gͬᵉ » 🌐
                                          @subm3rge@infosec.exchange

                                          Has anyone in or on figured out a lean and easy way to filter all the bot posts on their score or product?

                                          I get bursts of a wide range, and basically I only want a narrow subset. But I do want them.

                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                            @Steve12L@mamot.fr

                                            ⋅ ShinyHunters Claims 350GB Data Breach at European Commission

                                            hackread.com/shinyhunters-350g

                                              AodeRelay boosted

                                              [?]Julian Oliver » 🌐
                                              @JulianOliver@mastodon.social

                                              I spent the rainy part of this autumn day studying more on PQC (post quantum cryptography) in the context of mitigating for harvest-now-decrypt-later attacks. If you have openssl >=3.5.* locally you can test for it yourself against $CRITICAL service of your choice:

                                              openssl s_client -groups X25519MLKEM768 -connect example.horse:443

                                              You might as well hit :993, :25 and :587 on your MTA while you're at it.

                                              Good to get ahead of the qday (cough) curve

                                                [?]Jonathan Kamens 86 47 » 🌐
                                                @jik@federate.social

                                                Happy "LASTPASS COURT ORDERED NOTICE OF CLASS ACTION SETTLEMENT" day to those who celebrate!

                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                  @Steve12L@mamot.fr

                                                  ⋅ Red Hat Warns of Malware Code Embedded in Popular Linux Tool Allow Unauthorized Access to Systems

                                                  cybersecuritynews.com/linux-to

                                                    ClaudioM boosted

                                                    [?]k3ym𖺀 » 🌐
                                                    @k3ym0@infosec.exchange

                                                    In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                                    Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                                    RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                                    Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                                    blog: blog.rice.is/post/doom-over-dn

                                                    repo: github.com/resumex/doom-over-d

                                                    Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                                    It was always DNS.

                                                      Gwenn boosted

                                                      [?]Adam » 🌐
                                                      @adamsaidsomething@mastodon.social

                                                      The correct way to run a headline for this story. The reg does not disappoint

                                                      Register headline: Country that put backdoors into Cisco routers to spy on world bans foreign routers
Unfortunately, there aren't many options unless you're Starlink
Dan Robinson Tue 24 Mar 2026

                                                      Alt...Register headline: Country that put backdoors into Cisco routers to spy on world bans foreign routers Unfortunately, there aren't many options unless you're Starlink Dan Robinson Tue 24 Mar 2026

                                                        Flibustien boosted

                                                        [?]Nicolas MØUART » 🌐
                                                        @silentexception@mastodon.social

                                                        "Des données ultra-sensibles qui alimentent la peur. « Je ne sais plus quoi faire », nous confie un tireur souhaitant garder l’anonymat. « Si le SIA a vraiment leaké, c’est très compliqué. Il y a toutes les infos à jour sur notre stock d’armes, l’arme, le calibre… "😬

                                                        numerama.com/cyberguerre/22180

                                                        DamonHD boosted

                                                        [?]Jonathan Kamens 86 47 » 🌐
                                                        @jik@federate.social

                                                        Looks like the bad guys are using the email addresses harvested from the / . I just received this email on an email address I've never used for anything else. I'll be deactivating the email address, of course.
                                                        I like , but there's one important feature it's missing: I really wish they would implement an integration with .
                                                        Ref: haveibeenpwned.com/Breach/WIRED
                                                        FYI @troyhunt @zackwhittaker @briankrebs

                                                        Screenshot of email message with a header bar at the top of the body showing that it was routed through Addy.io. That header bar indicates that the description associated with the destination email address at Addy.io is "condenast.com, wired.com".

                                                        Alt...Screenshot of email message with a header bar at the top of the body showing that it was routed through Addy.io. That header bar indicates that the description associated with the destination email address at Addy.io is "condenast.com, wired.com".

                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                        @Steve12L@mamot.fr

                                                        ⋅ LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

                                                        thehackernews.com/2026/03/leak

                                                          Dๅᴉĸo boosted

                                                          [?]BeyondMachines :verified: » 🤖 🌐
                                                          @beyondmachines1@infosec.exchange

                                                          French Ministry of Education Data Breach Exposes 243,000 Staff Records

                                                          The French Ministry of National Education reports a data breach affecting 243,000 individuals after an attacker stole personal records from the COMPAS HR system. The stolen data, including names and addresses, has been partially leaked online, prompting the ministry to suspend the system and involve national cybersecurity authorities.

                                                          ****

                                                          beyondmachines.net/event_detai

                                                            AodeRelay boosted

                                                            [?]Kim Crawley (she/her) 😷🍉 » 🌐
                                                            @crowgirl@hachyderm.io

                                                            One day, the Gen AI bubble will burst and tech companies will hire highly experienced human beings with impressive bodies of work to do research and writing about cybersecurity. (We will probably need to deal with all the tech debt and vulns from slop code.)

                                                            Until then, I need to pay my rent.

                                                            Please share. ❤️

                                                            zeroes.ca/@kimcrawley/11628500

                                                            AodeRelay boosted

                                                            [?]Kim Crawley 😷 (she/her) » 🌐
                                                            @kimcrawley@zeroes.ca

                                                            Please boost! Please share!

                                                            I am Kim Crawley and I research and write about all areas of cybersecurity. I do it the "old fashioned" way by actually using my brain and doing the work... No Gen AI! Fuck Gen AI! I hate Gen AI! I founded Stop Gen AI!

                                                            I've worked for:

                                                            - Siemens (Digital Industries World)
                                                            - BlackBerry Cylance
                                                            - Kaspersky
                                                            - Hack The Box
                                                            - O'Reilly Media
                                                            - Wiley Tech
                                                            - AT&T Cybersecurity

                                                            My portfolio is here: kimcrawley.com

                                                            - Whitepapers
                                                            - Blogs
                                                            - Documentation
                                                            - Books
                                                            - Threat analysis
                                                            - Enterprise cybersecurity instruction and consulting

                                                            I'm in Tribe of Hackers.

                                                            I cowrote The Pentester Blueprint.

                                                            I'm writing Technofascism Survival Guide now, successful Kickstarter is still taking late pledges for $12 USD eBooks: kickstarter.com/projects/kimcr

                                                            Email me: kim(dot)crawley(at)stopgenai.com

                                                            Signal: crowgirl.84

                                                            Or reply here.

                                                            O'REILLY" \ 0,"

Zero Trust

Architecture

in Kubernetes h
> ° . 7)

Kim Crawley [J _ 7,

                                                            Alt...O'REILLY" \ 0," Zero Trust Architecture in Kubernetes h > ° . 7) Kim Crawley [J _ 7,

                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                @Steve12L@mamot.fr

                                                                ⋅ Node.js Patches Multiple Vulnerabilities That Enable DoS Attacks and Process Crashes

                                                                cybersecuritynews.com/node-js-

                                                                  Marcus Adams boosted

                                                                  [?]MissConstrue [She/Her (Crone Extraordinaire)] » 🌐
                                                                  @MissConstrue@mefi.social

                                                                  If you have an device and you have not updated, you are in danger of a zero click hack, () the bones of which were just published on .

                                                                  It allows attackers to seize full control by just visiting a compromised website, without requiring any clicks, downloads, or user interaction. The malware operates in memory, deleting its own traces to avoid detection.

                                                                  Update to iOS 26.3.1 or the latest available version (18.7.6 or higher). If you are running an older hardware, update to at least iOS 15, for emergency patches for older devices.

                                                                  Go to Settings > General > Software Update to ensure you are fully updated.

                                                                  If you cannot update immediately, or if you are at high risk, enable Lockdown Mode. This is an extreme, high-security mode. Go to Settings > Privacy & Security > Lockdown Mode and turn it on.

                                                                  mashable.com/article/iphone-ex

                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                    @jik@federate.social

                                                                    Hey @zackwhittaker, I admire how you implied "This is really stupid" in this article with complete plausible deniability.
                                                                    techcrunch.com/2026/03/24/fcc-
                                                                    There's a lot that could be done through regulation to improve the security of consumer routers in the United States. Banning all routers made overseas isn't going to do it.
                                                                    Let's be honest: this is an economic policy masquerading as a security policy. The only real impact will be Americans paying more for routers.

                                                                      [?]GreyNoise » 🌐
                                                                      @greynoise@infosec.exchange

                                                                      200,886,675 sessions. 101 unique source IPs. March 16–23, 2026.

                                                                      GreyNoise At The Edge intelligence brief highlights:

                                                                      1. The MEVSPACE RDP brute-force operator returned after a 99.8% infrastructure collapse — single IP generated 7,975,241 sessions before deliberately withdrawing after 4 days. GreyNoise has tracked a surge-withdraw-reconstitute cycle since January 2026, reinforcing that well-resourced operators can reconstitute capacity within days.

                                                                      2. Two coordinated campaigns emerged: VPSVAULT.HOST (IoT worm weaponizing 21+ CVEs against 12+ manufacturers) and Omegatech (TLS fingerprint randomization with 5,854 unique JA3s per node).

                                                                      3. Sophos CVE-2022-1040 exploitation stabilized at 638,654 sessions in its fifth consecutive week. Enterprise VPN credential pressure reached week 9 across five vendors with 2.9M+ combined sessions.

                                                                      4. n8n CVE-2026-21858 (CVSS 10.0) reached 118,086 sessions with links to MuddyWater and ZeroBot. ICS/SCADA reconnaissance expanded with new HMI and PLC vulnerabilities trending.

                                                                      🔗 greynoise.io/resources/at-the-

                                                                        AodeRelay boosted

                                                                        [?]Kim Crawley 😷 (she/her) » 🌐
                                                                        @kimcrawley@zeroes.ca

                                                                        Please boost! Please share!

                                                                        I am Kim Crawley and I research and write about all areas of cybersecurity. I do it the "old fashioned" way by actually using my brain and doing the work... No Gen AI! Fuck Gen AI! I hate Gen AI! I founded Stop Gen AI!

                                                                        I've worked for:

                                                                        - Siemens (Digital Industries World)
                                                                        - BlackBerry Cylance
                                                                        - Kaspersky
                                                                        - Hack The Box
                                                                        - O'Reilly Media
                                                                        - Wiley Tech
                                                                        - AT&T Cybersecurity

                                                                        My portfolio is here: kimcrawley.com

                                                                        - Whitepapers
                                                                        - Blogs
                                                                        - Documentation
                                                                        - Books
                                                                        - Threat analysis
                                                                        - Enterprise cybersecurity instruction and consulting

                                                                        I'm in Tribe of Hackers.

                                                                        I cowrote The Pentester Blueprint.

                                                                        I'm writing Technofascism Survival Guide now, successful Kickstarter is still taking late pledges for $12 USD eBooks: kickstarter.com/projects/kimcr

                                                                        Email me: kim(dot)crawley(at)stopgenai.com

                                                                        Signal: crowgirl.84

                                                                        Or reply here.

                                                                        O'REILLY" \ 0,"

Zero Trust

Architecture

in Kubernetes h
> ° . 7)

Kim Crawley [J _ 7,

                                                                        Alt...O'REILLY" \ 0," Zero Trust Architecture in Kubernetes h > ° . 7) Kim Crawley [J _ 7,

                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                          @Steve12L@mamot.fr

                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                          @Steve12L@mamot.fr

                                                                          ⋅ Gcore Radar report reveals 150% surge in DDoS attacks year-on-year

                                                                          cybersecuritynews.com/gcore-ra

                                                                            9x0rg boosted

                                                                            [?]Julian Oliver » 🌐
                                                                            @JulianOliver@mastodon.social

                                                                            Why run your own Virtual Private Network, in 2026?

                                                                            I wrote a post unpacking this Q, with a view to pushing folk to reclaim VPN technology in this neo-feudalist era of the Internet, clawing back autonomy (and privacy) from the big VPN providers.

                                                                            courses.nikau.io/2026/03/24/wh

                                                                              [?]jbz » 🌐
                                                                              @jbz@indieweb.social

                                                                              🦅 The US government just banned consumer routers made outside the US

                                                                              「 It is not clear how simply moving production of routers domestically would make them safer. In the Volt Typhoon hack, Chinese state-sponsored hackers primarily targeted Cisco and Netgear routers, routers designed by US companies, according to the Department of Justice 」

                                                                              theverge.com/news/899172/fcc-f

                                                                                [?]Jonathan Kamens 86 47 » 🌐
                                                                                @jik@federate.social

                                                                                Hey folks.
                                                                                I know it's fun to dump on Microsoft's security, so the recent @ProPublica article (propublica.org/article/microso) is blood in the water. But please stop saying that the FedRAMP office called Microsoft's tech "a pile of shit." That's not true.
                                                                                They called *their FedRAMP package* a pile of shit.
                                                                                Y'all understand the difference between "your compliance package is shit" and "your tech is shit."
                                                                                Y'all know compliance and security are not the same thing.
                                                                                Please act like it.
                                                                                Thanks.

                                                                                  [?]Frederik [he/him] » 🌐
                                                                                  @fre@infosec.exchange

                                                                                  Today I learned about flare.io, a company that provides other companies with detailed intel about data leaks affecting them.

                                                                                  Here's the catch: Unlike @haveibeenpwned or even intelx, they store everything that they can get their hands on. During a live demo, they proudly pulled up all email/password pairs that they have for a company that is not one of their customers, showed off how it saves not just the combo but everything the infostealer got, including all browser cookies and a screenshot of the personal machine of an affected employee.

                                                                                  So many things wrong with this..

                                                                                  • We just told them which company to look up, no verification at all.
                                                                                  • Bringing a demo laptop logged in to a "full admin" account that can see all data that they have access to, to a conference stand
                                                                                  • Storing a screenshot of a personal machine from an employee is absolutely not okay.
                                                                                  • and so much more...

                                                                                  When asked about legalities, they claim "it's based on needing to know this information for the companies" and falsely claimed "haveibeenpwned does the same thing, they also sell access to the combos" 🫨

                                                                                  Anyway, i sent a GDPR request for my data (and subsequent deletion), let's see what happens.

                                                                                  ETA: to be clear, this wasn't a one off demo, they do this demo for everyone that walks up to their stand, and we have strong reasons to believe that the cleartext passwords that they show anyone that asks are real passwords and not demo data.

                                                                                    AodeRelay boosted

                                                                                    [?]Radio_Azureus » 🌐
                                                                                    @Radio_Azureus@ioc.exchange

                                                                                    Security Patches

                                                                                    InfoSec

                                                                                    Regardless of which Operating System you run, it is important to keep up with the critical updates to keep your machines as safe as possible

                                                                                    • Realize that by the time a critical bug has been reported, verified, patched and delivered to your distribution of choice, a significant amount of time has passed...
                                                                                    • From the first day the bug has been discovered [zero day] to the day you patch your computing machine, you've had a vunurable open machine in that one respect.
                                                                                    • Keep the amount of time between the availability, of patches & the update of your machines, especially your VMs (Qemu et al) & physical servers as short as possible
                                                                                    • Make sure to always use manual updates on your server VM's!
                                                                                    • I shall not explain why, start reading on Wikipedia and furthe, the explanation is too long for this short post

                                                                                    Notes:

                                                                                    • every OS can have vunurabilities
                                                                                    • Security in obscurity does not work!
                                                                                    • you are not secure because you run obsolete AmigaOS QNX or cool and niche *BSD as an OS
                                                                                    • buffer overflows hide everywhere
                                                                                    • I reguraly find them!

                                                                                    photograph of updating a machine

                                                                                    Alt...photograph of updating a machine

                                                                                    photograph of pathcing a machine

                                                                                    Alt...photograph of pathcing a machine

                                                                                      [?]k3ym𖺀 » 🌐
                                                                                      @k3ym0@infosec.exchange

                                                                                      @OlivierBurnier @ublockorigin

                                                                                      Mistral: two blocked requests.

                                                                                      Cloudflare Insights ("is the site up") and a single Intercom beacon POST that didn't even retry.

                                                                                      that's it. no Statsig. no tracking GIFs. no Google Analytics. no distributed tracing. no proof-of-work challenge. no KETCHUP_DISCOVERY_CARD. nothing.

                                                                                      a French AI company nobody talks about is running the cleanest frontend in the entire field by a factor of roughly 150x and we're all sleeping on it

                                                                                      les français ont tout compris

                                                                                        AodeRelay boosted

                                                                                        [?]Larvitz » 🌐
                                                                                        @Larvitz@mastodon.bsd.cafe

                                                                                        Exciting news. I've just pushed a collection of ports for the Card ecosystem to Codeberg.

                                                                                        Includes:
                                                                                        - openpgp-card-tools (oct)
                                                                                        - openpgp-card-tools-git (oct-git)
                                                                                        - openpgp-card-ssh-agent

                                                                                        I'm currently polishing them for official submission to the freebsd ports tree this April!

                                                                                        A huge thank you to @hko for these excellent tools!

                                                                                        codeberg.org/Larvitz/freebsd-o

                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                          @Steve12L@mamot.fr

                                                                                          🇬🇧 ⋅ The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

                                                                                          −, cloud.google.com/blog/topics/t

                                                                                          −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−

                                                                                          🇫🇷 ⋅ DarkSword : comment des scripts JavaScript parviennent à contourner le bac à sable d'Apple

                                                                                          zdnet.fr/actualites/darksword-

                                                                                            [?]Jonathan Kamens 86 47 » 🌐
                                                                                            @jik@federate.social

                                                                                            just put out the second critical security update for their NAS operating system in four days <synology.com/en-global/release>; the previous one was released on the 16th.
                                                                                            The new one is to fix, of all things, a vulnerability in telnetd:
                                                                                            lists.gnu.org/archive/html/bug
                                                                                            I'm glad they're patching it, but I kind of wish they would just, I dunno, not ship telnetd with their OS? I'm hard-pressed to think of a use-case for telnetd that can't be satisfied with sshd.

                                                                                              [?]Jonathan Kamens 86 47 » 🌐
                                                                                              @jik@federate.social

                                                                                              My employer uses a web host (WH) that uses IIS.
                                                                                              Our external pen test caught one of our websites exposing Web.config. (How can there be a WH in 2026 that doesn't know to block this? Why isn't it blocked by default in IIS?)
                                                                                              We asked WH to fix it.
                                                                                              They did.
                                                                                              We asked pen-tester to retest.
                                                                                              Before they retested, WH broke it and made the file visible again.
                                                                                              So now we have to get WH to fix it again AND possibly pay the pen-tester for a second retest since our contract only specifies one. 🤦😡

                                                                                                [?]Jonathan Kamens 86 47 » 🌐
                                                                                                @jik@federate.social

                                                                                                Size matters

                                                                                                …but not in the way you think.

                                                                                                blog.kamens.us/2026/03/19/size

                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                  @Steve12L@mamot.fr

                                                                                                  AodeRelay boosted

                                                                                                  [?]rk: it’s hyphen-minus actually » 🌐
                                                                                                  @rk@mastodon.well.com

                                                                                                  I have been in infosec for a long time. By some measures it’s over three decades. That’s as many a three tens of years. It’s been a while.

                                                                                                  I’d like to take this opportunity to convey some of my hard-earned wisdom to the next generation.

                                                                                                  If you want to test EtherNet/IP message forwarding and it isn’t working, be sure you didn’t disable message forwarding to test something else and forgot about it.

                                                                                                  This has been “Rob brings you infosec wisdom” episode 8392763.

                                                                                                    Marcos Dione boosted

                                                                                                    [?]rk: it’s hyphen-minus actually » 🌐
                                                                                                    @rk@mastodon.well.com

                                                                                                    Buddy of mine is in pretty dire straits. He’s got decades in but he went through a nasty divorce and then got laid off twice in 18 months and the psychological and financial toll has been immense. He’s been looking for work for well over a year now and has gotten no bites.

                                                                                                    If anyone is looking for a CISO/infosec manager/security team architect let me know. He’s served in those kind of roles for huge orgs, small orgs, and everything in between.

                                                                                                      [?]Etienne / Tek [he/him] » 🌐
                                                                                                      @tek@todon.eu

                                                                                                      [?]βrυɲϋs » 🌐
                                                                                                      @brunus@mamot.fr

                                                                                                      Base de codes ADN récoltés par des sociétés privées US à disponibilité de la police française.

                                                                                                      Gérald Darmanin à rappelé, tout guilleret, aujourd'hui lors d'un point presse que : "Les français et les françaises ont offert, à des fins de loisirs, pour la recherche de proches ou de généalogie, leur ADN a des sociétés privées, généralement basées aux USA. Ces codes génétique nous sont aujourd'hui accessible via des accords avec les services des USA..."

                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                        @Steve12L@mamot.fr

                                                                                                        ⋅ CVE-2026-32746 : les serveurs Linux menacés par une nouvelle faille Telnet

                                                                                                        it-connect.fr/cve-2026-32746-l

                                                                                                          Marcos Dione boosted

                                                                                                          [?]Graham Cluley » 🌐
                                                                                                          @gcluley@mastodon.green

                                                                                                          Equifax got hacked. Nearly 150 million people's data stolen. And the executives' first move was to quietly sell their shares. 🤦

                                                                                                          This is The Facepalm Files.

                                                                                                          Check out my podcast "Smashing Security" for more stories like this.

                                                                                                          Alt...Graham Cluley ranting about Equifax.

                                                                                                            AodeRelay boosted

                                                                                                            [?]Radio_Azureus » 🌐
                                                                                                            @Radio_Azureus@ioc.exchange

                                                                                                            LLM hallucinated spam slop

                                                                                                            Even a parrot would formulate a better set of sentences. This is easily sent to /dev/null

                                                                                                            @stefano

                                                                                                              Gwenn boosted

                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                              @Steve12L@mamot.fr

                                                                                                              ⋅ Simple Custom Font Rendering Can Poison ChatGPT, Claude, Gemini, and Other AI Systems

                                                                                                              cybersecuritynews.com/custom-f

                                                                                                                [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                @jik@federate.social

                                                                                                                If you, as an information security professional, think an acceptable way to defend against fraudulent accounts is to limit the *legitimate* email address domains you allow your users to use, then you are bad at your job and you are a bad person and you should feel bad.

                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                  @Steve12L@mamot.fr

                                                                                                                  ⋅ Meta to Permanently Remove End-to-End Encryption Feature in Instagram DMs

                                                                                                                  cybersecuritynews.com/instagra

                                                                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                    @jik@federate.social

                                                                                                                    How I ended up summarizing my pages of advice, which didn't even cover everything I wanted to cover:
                                                                                                                    "If you're doing something about which you're worried about the government coming after you or the people you're with now or in the future, it might be prudent to leave your phone home, or turn it off and not turn it back on until you're back home unless there's an emergency."

                                                                                                                    (2/2)

                                                                                                                      [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                      @jik@federate.social

                                                                                                                      Activist: "Should we put our phones in airplane mode when we're doing activist stuff?"
                                                                                                                      Me: [responds with two pages of text about threat modeling, risk assessment, levels of protection, current and future threats]
                                                                                                                      I don't think most people realize how hard it is to give people simple, straightforward cybersecurity guidance.
                                                                                                                      There's a huge risk in erring on the side of caution: people finding your recommendations burdensome and doing _nothing_ as a result.

                                                                                                                      (1/2)

                                                                                                                        maswan boosted

                                                                                                                        [?]BSides Ume » 🌐
                                                                                                                        @BSidesUme@social.accum.se

                                                                                                                        Got any interesting infosec and adjacent workshops or villages that you want to run with us on June 17th? We'd love to see them happen!

                                                                                                                        indico.neic.no/event/287/abstr

                                                                                                                          [?]Dane 🌎🖖✌️☮️⚛️☸️🕉️ » 🌐
                                                                                                                          @TheLastOfHisName@beige.party

                                                                                                                          A long and WELL sourced post on exactly who has been behind all the state level legislation aimed at OS level age verification.

                                                                                                                          "I traced $2 billion in nonprofit grants and 45 states of lobbying records to figure out who's behind the age verification bills. The answer involves a company that profits from your data writing laws that collect more of it."

                                                                                                                          *EDIT*
                                                                                                                          Direct link to the GitHub dataset:

                                                                                                                          github.com/upper-up/meta-lobby

                                                                                                                          Original redlib post and comments:

                                                                                                                          redlib.catsarch.com/r/linux/co

                                                                                                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                            @Steve12L@mamot.fr

                                                                                                                            ⋅ ‘CrackArmor’ Vulnerability in AppArmor Impacts 12.6M Linux Systems

                                                                                                                            hackread.com/crackarmor-vulner

                                                                                                                              [?]Windy city » 🌐
                                                                                                                              @pheonix@hachyderm.io

                                                                                                                              Is this the first time a major service has removed end-to-end encryption instead of adding it? Why Instagram?

                                                                                                                              Screenshot showing, "Instagram's end-to-end encrypted messaging is ending on 8 May"

                                                                                                                              Alt...Screenshot showing, "Instagram's end-to-end encrypted messaging is ending on 8 May"

                                                                                                                                AodeRelay boosted

                                                                                                                                [?]Dane 🌎🖖✌️☮️⚛️☸️🕉️ » 🌐
                                                                                                                                @TheLastOfHisName@beige.party

                                                                                                                                "We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in: mandatory age verification creates massive, centralized honeypots of sensitive biometric data that will inevitably be breached. Every single time. And every single time it happens, the politicians who mandated these systems and the companies that built them act shocked—shocked!—that collecting enormous databases of government IDs, facial scans, and biometric data from millions of people turns out to be a security nightmare."

                                                                                                                                techdirt.com/2026/02/25/hacker

                                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                  @Steve12L@mamot.fr

                                                                                                                                  ⋅ Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages

                                                                                                                                  hackread.com/hackers-cloudflar

                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                    [Accès Libre]

                                                                                                                                    ⋅ Le logiciel espion utilisé par le renseignement russe avait bien été développé pour la NSA

                                                                                                                                    next.ink/brief_article/le-logi

                                                                                                                                      [?]Brian Greenberg :verified: » 🌐
                                                                                                                                      @brian_greenberg@infosec.exchange

                                                                                                                                      The line between national security and political surveillance is thinning. Congressional Democrats just launched an inquiry into the Department of Homeland Security regarding its use of administrative subpoenas. Unlike the subpoenas you see in courtroom dramas, these do not require a judge’s signature. They allow federal agencies to demand personal information and internal communications directly from technology companies with almost zero outside oversight.

                                                                                                                                      This investigation follows reports that DHS used these "judge-free" demands to gather data on Americans who criticized the agency on social media. It is a significant moment for anyone in the tech industry. When the government can compel your data without a warrant, the First Amendment starts to look very fragile. You should watch how these tech firms respond to the inquiry, as it will set the standard for how they protect your information from administrative overreach.

                                                                                                                                      🧠 Lawmakers are demanding to know how often DHS uses subpoenas without judicial review.
                                                                                                                                      ⚡ The inquiry follows evidence that critics of agency policy were specifically targeted.
                                                                                                                                      🎓 Major tech platforms must now disclose their internal protocols for handling these federal demands.
                                                                                                                                      🔍 Civil liberties groups are pushing for new legislation to require a judge’s approval for all data seizures.

                                                                                                                                      washingtonpost.com/nation/2026

                                                                                                                                        [?]Foudreclair » 🌐
                                                                                                                                        @foudreclair@piaille.fr

                                                                                                                                        Coruna Jailbreak
                                                                                                                                        Exploit pour iOS 13 → 17.2.1, lançable directement dans le navigateur

                                                                                                                                        34306.lol

                                                                                                                                          [?]Hack in Days of Future Past » 🌐
                                                                                                                                          @allainyann@piaille.fr

                                                                                                                                          Can small open-source models learn advanced mathematical reasoning? And more importantly: how do you actually build them?

                                                                                                                                          Great talk by Lewis Tunstall from huggingface on training reasoning models with smart pipelines: SFT, RL with grading rubrics, reasoning cache & inference scaffolds.

                                                                                                                                          Lots of ideas to explore similar approaches in

                                                                                                                                          youtube.com/watch?v=kSsyBXf8uMM

                                                                                                                                            [?]gregR ☯ » 🌐
                                                                                                                                            @gregr@mamot.fr

                                                                                                                                            Échec et mat !

                                                                                                                                            > Check Point ThreatCloud flags whole cloudfront.net... - Check Point CheckMates
                                                                                                                                            > False positives can happen and do happen from time to time. Normally I would not create a CheckMates post for that.
                                                                                                                                            community.checkpoint.com/t5/Ge

                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                              ⋅ Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

                                                                                                                                              thehackernews.com/2026/03/doze

                                                                                                                                                [?]Ludovic :Firefox: :FreeBSD: » 🌐
                                                                                                                                                @usul@piaille.fr

                                                                                                                                                [?]Bryan Steele :flan_beard: » 🌐
                                                                                                                                                @brynet@bsd.network

                                                                                                                                                I don't suppose that I have any friends out there willing to signal boost, by chance? :flan_heart::flan_hacker:

                                                                                                                                                bsd.network/@brynet/1144589971

                                                                                                                                                  [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                                  @rysiek@mstdn.social

                                                                                                                                                  :drake_dislike: Moltbook is a social network for AI agents

                                                                                                                                                  :drake_like: Moltbook is a botnet C&C portal

                                                                                                                                                    [?]Terri K O 🍁 » 🌐
                                                                                                                                                    @terri@social.afront.org

                                                                                                                                                    Learning about the "bodysnatcher" attack on serviceNow and "ai agents authenticated only by an unverified email address and a well known reused api token" is so great i bet everyone is doing it.

                                                                                                                                                      mmu_man boosted

                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                      « Des milliards dépensés et les grands projets logiciels continuent d'échouer », Robert N. Charette souligne que 5 600 milliards de dollars sont dépensés chaque année en informatique, mais que « les taux de réussite des logiciels ne se sont pas nettement améliorés au cours des deux dernières décennies ».

                                                                                                                                                      ⋅ L'IA va t-elle rendre la cybersécurité obsolète ? Ou bien la Silicon Valley est-elle encore en train de fantasmer ?

                                                                                                                                                      zdnet.fr/actualites/lia-va-t-e

                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                        ⋅ Signal Confirms Targeted Phishing Attacks Resulting in Account Takeovers

                                                                                                                                                        cybersecuritynews.com/signal-c

                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                          ⋅ Scandale de babyphones vidéo : un chercheur français découvre plus d'un million d'appareils totalement exposés

                                                                                                                                                          clubic.com/actualite-603772-sc

                                                                                                                                                            [?]FLOX Advocate » 🌐
                                                                                                                                                            @FLOX_advocate@floss.social

                                                                                                                                                            [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                            @jik@federate.social

                                                                                                                                                            Someone make this make sense…
                                                                                                                                                            Yesterday when we were at the car dealer,¹ before we submitted our auto loan application², I unfroze our credit reports at TransUnion, Experian, and Equifax so the loan application would go through.³
                                                                                                                                                            I have email confirming that my report was unfrozen at TransUnion, so I must have successfully logged into their website.
                                                                                                                                                            Today, when I went to put the freezes back, I wasn't able to log into the TransUnion website with the credentials in 1Password.
                                                                                                                                                            (1/5)

                                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                                              ⋅ Malicious imToken Chrome Extension Caught Stealing Mnemonics and Private Keys

                                                                                                                                                              cybersecuritynews.com/maliciou

                                                                                                                                                                [?]Mark Wyner Won’t Comply :vm: » 🌐
                                                                                                                                                                @markwyner@mas.to

                                                                                                                                                                Digital rights and privacy with the @privacyguides Privacy Activist Toolbox. Hours of reading in there, but it’s a treasure chest.

                                                                                                                                                                privacyguides.org/en/activism/

                                                                                                                                                                  Marcos Dione boosted

                                                                                                                                                                  [?]Shawn Webb [He/Him] » 🌐
                                                                                                                                                                  @lattera@bsd.network

                                                                                                                                                                  So I need to test the security properties of a remote TLS server. Normally, I'd use Qualys' TLS server testing tools. However, this server uses an IPv4 allowlist, so Qualys wouldn't be able to reach it.

                                                                                                                                                                  So, I'm looking for tools I can run locally (Linux, the BSDs, or Windows).

                                                                                                                                                                  Anyone have any suggestions?

                                                                                                                                                                    AodeRelay boosted

                                                                                                                                                                    [?]Mike Sheward » 🌐
                                                                                                                                                                    @SecureOwl@infosec.exchange

                                                                                                                                                                    a very cool technique that some salesfolk are doing now - if you have the iOS phone call screening thing turned on on your phone, they state their reason for calling as

                                                                                                                                                                    "cybersecurity breach" or "urgent breach detected"

                                                                                                                                                                    Because they know that'll go to your screen as text.

                                                                                                                                                                    And by very cool what I mean is "a very cool way of making sure I never talk to you"

                                                                                                                                                                      Taggart boosted

                                                                                                                                                                      [?]k3ym𖺀 » 🌐
                                                                                                                                                                      @k3ym0@infosec.exchange

                                                                                                                                                                      ProtonMail anonymity speedrun, any%:

                                                                                                                                                                      step 1: don’t use your real email to sign up, you absolute muppet. use a burner. gorilla mail – free, dies after an hour, leaves no trace.

                                                                                                                                                                      step 2: free tier is fine. need to upgrade? Monero or cash. do NOT hand them a credit card.

                                                                                                                                                                      step 3: want ToR? boot Tails OS first, full stop. Tails forgets you exist on shutdown, ToR handles the routing. together they mean something. separately you’re just cosplaying at privacy.

                                                                                                                                                                      that’s it. that’s the whole guide. it’s not hard. the threat model does the heavy lifting, you just have to put in the work.

                                                                                                                                                                      stay feral. 🐀

                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                        ⋅ Amazon AWS-LC Vulnerabilities Allows Attackers to Bypass Certificate Chain Verification

                                                                                                                                                                        cybersecuritynews.com/amazon-a

                                                                                                                                                                          [?]k3ym𖺀 » 🌐
                                                                                                                                                                          @k3ym0@infosec.exchange

                                                                                                                                                                          RE: hachyderm.io/@evacide/11617870

                                                                                                                                                                          hot take: @protonprivacy didn’t fail you. YOUR OPSEC failed you.

                                                                                                                                                                          encryption ≠ anonymity. these are not the same thing and never have been.

                                                                                                                                                                          Proton did exactly what they said they’d do - encrypted your emails and complied with lawful Swiss legal orders. that’s the whole deal. that’s what you signed up for.

                                                                                                                                                                          the credit card you used to pay for your “anonymous” account was never part of the encryption. that was always traceable. that was always a liability.

                                                                                                                                                                          and here’s the kicker - Proton literally accepts Monero and cash. they gave you the tools. you chose the Visa.

                                                                                                                                                                          ​​​​​​​​​​​​​​​​

                                                                                                                                                                          [?]evacide » 🌐
                                                                                                                                                                          @evacide@hachyderm.io

                                                                                                                                                                          If you pay Proton Mail for a service, they may hand over the payment data in response to a court order: 404media.co/proton-mail-helped

                                                                                                                                                                            AodeRelay boosted

                                                                                                                                                                            [?]DoomsdaysCW » 🌐
                                                                                                                                                                            @DoomsdaysCW@kolektiva.social

                                                                                                                                                                            Helped Unmask Anonymous ‘

                                                                                                                                                                            by Joseph Cox
                                                                                                                                                                            Mar 5, 2026 at 3:36 PM

                                                                                                                                                                            A court record reviewed by 404 Media shows privacy-focused email provider Proton Mail handed over payment data related to a Stop Cop City email account to the Swiss government, which handed it to the FBI.

                                                                                                                                                                            Read more:
                                                                                                                                                                            404media.co/proton-mail-helped

                                                                                                                                                                            Archived version:
                                                                                                                                                                            archive.ph/8cpN1

                                                                                                                                                                              [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                              @jik@federate.social

                                                                                                                                                                              RE: mastodon.social/@404mediaco/11

                                                                                                                                                                              If you're an activist, you can't rely on Proton Mail to keep your identity private unless you figure out how to pay them in a way that can't be linked back to you.
                                                                                                                                                                              I'm not going to say that Proton was in the wrong here—they didn't do anything that they claim they won't do—but I will say that I think some people may have an inflated sense of the extent to which Proton can/will protect their privacy when the rubber hits the road.

                                                                                                                                                                              [?]404 Media » 🌐
                                                                                                                                                                              @404mediaco@mastodon.social

                                                                                                                                                                              A court record reviewed by 404 Media shows privacy-focused email provider Proton Mail handed over payment data related to a Stop Cop City email account to the Swiss government, which handed it to the FBI.

                                                                                                                                                                              404media.co/proton-mail-helped

                                                                                                                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                @Steve12L@mamot.fr

                                                                                                                                                                                Tykayn boosted

                                                                                                                                                                                [?]Riku Silvola » 🌐
                                                                                                                                                                                @rikusilvola@infosec.exchange

                                                                                                                                                                                I'm looking for a senior software engineer to join my team working on securing Wikipedia and our other projects. We've got a huge platform, a great mission and a team of passionate engineers and product managers working together with the community.

                                                                                                                                                                                Wikipedia just celebrated its 25th birthday in January, and there's a lot of energy to take on big challenges. Come help us tackle them head-on!

                                                                                                                                                                                Job: job-boards.greenhouse.io/wikim

                                                                                                                                                                                Team: mediawiki.org/wiki/Product_Saf

                                                                                                                                                                                  [?]Mark Wyner Won’t Comply :vm: » 🌐
                                                                                                                                                                                  @markwyner@mas.to

                                                                                                                                                                                  I’m finding an increasing number of sites are blocking me while using VPN. I use Mullvad. Is anyone else experiencing this increase?

                                                                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                                                                    ⋅ PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser

                                                                                                                                                                                    hackread.com/pleasefix-flaw-ha

                                                                                                                                                                                      [?]Beπ » 🌐
                                                                                                                                                                                      @devbyben@piaille.fr

                                                                                                                                                                                      [?]Etienne / Tek [he/him] » 🌐
                                                                                                                                                                                      @tek@todon.eu

                                                                                                                                                                                      It seems that OAuth phishing attacks are back, I thought the approval process setup by Google and Microsoft killed that. Any idea how these attacks are bypassing the process?
                                                                                                                                                                                      microsoft.com/en-us/security/b

                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                        ⋅ Where Multi-Factor Authentication Stops and Credential Abuse Starts

                                                                                                                                                                                        thehackernews.com/2026/03/wher

                                                                                                                                                                                          opio ⏚ boosted

                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                          ⋅ La fin du « laisser-faire » dans la collecte de données personnelles ? La justice confirme l’amende monstre imposée à Criteo

                                                                                                                                                                                          01net.com/actualites/la-fin-du

                                                                                                                                                                                            [?]Beπ » 🌐
                                                                                                                                                                                            @devbyben@piaille.fr

                                                                                                                                                                                            Autopsie technique : Le dossier YGG

                                                                                                                                                                                            Pour ceux qui suivent l'évolution des trackers privés, ce dossier est une mine d'or sur "ce qu'il ne faut pas faire" en administration système et sécurité web.

                                                                                                                                                                                            L'analyse détaille la mise en pratique concrète de plusieurs vecteurs d'attaque :
                                                                                                                                                                                            - Failles SQL et injections exploitées.
                                                                                                                                                                                            - Défauts d'OpSec ayant mené à la désanonymisation de l'administration.
                                                                                                                                                                                            - Gestion des bases de données et fuites d'informations sensibles.

                                                                                                                                                                                            Un cas d'école sur la fragilité des infrastructures centralisées face à des acteurs déterminés.

                                                                                                                                                                                            👉 À lire ici : yggleak.top/fr/home/ygg-dossier

                                                                                                                                                                                            opio ⏚ boosted

                                                                                                                                                                                            [?]kravietz 🦇 » 🌐
                                                                                                                                                                                            @kravietz@agora.echelon.pl

                                                                                                                                                                                            Interesting new project from #Tor #SecureDrop - that’s essentially digitally signed web pages that are client-verified to prevent any server-side covert injection or backdooring. Sounds a bit like SRI (Subresource Integrity) but for the whole page and using digital signature not just server-delegated hash. Obviously, it won’t work for a typical ‘modern’ mash-up website that changes every minute, but sounds perfect for high-integrity and largely static pages such as SecureDrop.

                                                                                                                                                                                            WEBCAT helps protect users from malicious or unexpected changes to the client-side code of a web application. When a user visits a site that has enrolled in WEBCAT, the WEBCAT browser extension verifies the application’s served assets against a signed manifest before any content is executed. If verification fails, WEBCAT blocks the page from loading and shows a warning.

                                                                                                                                                                                            https://securedrop.org/news/webcat-alpha/

                                                                                                                                                                                            #infosec

                                                                                                                                                                                              AodeRelay boosted

                                                                                                                                                                                              [?]BastilleBSD :freebsd: » 🌐
                                                                                                                                                                                              @BastilleBSD@fosstodon.org

                                                                                                                                                                                              I'm pleased to report that I've just submitted the final capstone paper for my master's degree in cybersecurity!

                                                                                                                                                                                                [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                                                                                @rysiek@mstdn.social

                                                                                                                                                                                                I am seeing a lot – a *lot* – more e-mail spam than before. I am not the only one. Seems like some larger phishing campaign got kicked off?

                                                                                                                                                                                                I wonder if this is related to the aggression on Iran.

                                                                                                                                                                                                  [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                                                  @brian_greenberg@infosec.exchange

                                                                                                                                                                                                  Law enforcement agencies across four countries concluded a massive operation against a cybercrime ecosystem known as The Com. This group moved beyond digital theft into physical violence, including home invasions and kidnappings to steal cryptocurrency. Thirty individuals are now in custody after a coordinated effort by the FBI and international partners.

                                                                                                                                                                                                  The case highlights a dangerous shift in the risk profile of modern hacking. These criminals used Discord servers to recruit teenagers and coordinate SIM swapping attacks against high-profile targets. When digital barriers proved too strong, they turned to physical coercion. The dismantling of this network is as a reminder that the perceived anonymity of the internet is a fragile shield when federal agencies begin tracking financial trails and chat logs.

                                                                                                                                                                                                  🧠 Investigators arrested thirty members across the United States and Europe.
                                                                                                                                                                                                  ⚡ The group specialized in violent extortion to gain access to digital wallets.
                                                                                                                                                                                                  🎓 Law enforcement seized luxury vehicles and significant amounts of cryptocurrency.
                                                                                                                                                                                                  🔍 This operation targeted the infrastructure used to recruit young hackers.

                                                                                                                                                                                                  bleepingcomputer.com/news/secu

                                                                                                                                                                                                    [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                                                                                    @rysiek@mstdn.social

                                                                                                                                                                                                    There are scam notifications about "monetization" on here going around.

                                                                                                                                                                                                    👉 Don't fall for them.
                                                                                                                                                                                                    👉 Don't click the link.
                                                                                                                                                                                                    👉 Report and block on sight.

                                                                                                                                                                                                    There is no monetization scheme on mastodon.social, nor any other fedi instance I know of.

                                                                                                                                                                                                    Stay safe!

                                                                                                                                                                                                    Screenshot of a message from a scam account, @MonetizationNotification@mstdn.ca (already blocked on my instance).

I altered the phishing link in the description below on purpose, to make it harder to click on it.

@rysiek Mastodon Sent You Message

Important notification for your account!

The Mastodon team has noticed your activity on our forum and we would like to offer you a partnership.
Partnering with us means that monetization will be enabled for your account.

To begin collaborating with our team, please confirm that you are the owner of this account by following the link below. 
Verify now:  https://lyzo[.]io/icLJa

If you attempt to avoid verification, our system will freeze your account indefinitely.

Thank you for staying with us. 
Mastodon.social

                                                                                                                                                                                                    Alt...Screenshot of a message from a scam account, @MonetizationNotification@mstdn.ca (already blocked on my instance). I altered the phishing link in the description below on purpose, to make it harder to click on it. @rysiek Mastodon Sent You Message Important notification for your account! The Mastodon team has noticed your activity on our forum and we would like to offer you a partnership. Partnering with us means that monetization will be enabled for your account. To begin collaborating with our team, please confirm that you are the owner of this account by following the link below. Verify now: https://lyzo[.]io/icLJa If you attempt to avoid verification, our system will freeze your account indefinitely. Thank you for staying with us. Mastodon.social

                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                      ⋅ A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

                                                                                                                                                                                                      wired.com/story/coruna-iphone-

                                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                                        ⋅ Des hackers chinois se cachent dans Windows Update pour espionner des gouvernements sans se faire repérer

                                                                                                                                                                                                        clubic.com/actualite-603034-de

                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                          [abo]
                                                                                                                                                                                                          ⋅ USA : 7 ans de prison pour avoir volé, et vendu, des failles « 0days » à un courtier russe

                                                                                                                                                                                                          next.ink/226563/usa-7-ans-de-p

                                                                                                                                                                                                            [?]k3ym𖺀 » 🌐
                                                                                                                                                                                                            @k3ym0@infosec.exchange

                                                                                                                                                                                                            You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

                                                                                                                                                                                                            I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

                                                                                                                                                                                                            Claude:

                                                                                                                                                                                                            • Six parallel telemetry pipelines.
                                                                                                                                                                                                            • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
                                                                                                                                                                                                            • Intercom running a persistent WebSocket whether you use it or not.
                                                                                                                                                                                                            • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

                                                                                                                                                                                                            ChatGPT:

                                                                                                                                                                                                            • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
                                                                                                                                                                                                            • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
                                                                                                                                                                                                            • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
                                                                                                                                                                                                            • Also runs a proof-of-work challenge before you're allowed to type anything.

                                                                                                                                                                                                            Gemini:

                                                                                                                                                                                                            • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004. - Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

                                                                                                                                                                                                            When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

                                                                                                                                                                                                            KETCHUP_DISCOVERY_CARD.
                                                                                                                                                                                                            MUSTARD_DISCOVERY_CARD.
                                                                                                                                                                                                            MAYO_DISCOVERY_CARD.

                                                                                                                                                                                                            Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

                                                                                                                                                                                                            All three of these products cost money.
                                                                                                                                                                                                            One of them is also running ad infrastructure.

                                                                                                                                                                                                            Touch grass. Install @ublockorigin

                                                                                                                                                                                                              Taggart boosted

                                                                                                                                                                                                              [?]Ian Campbell 🏴 » 🌐
                                                                                                                                                                                                              @neurovagrant@masto.deoan.org

                                                                                                                                                                                                              NEW RESEARCH!

                                                                                                                                                                                                              @DomainTools Investigations researchers have spent the past several weeks pulling apart data from Russian threat actor Doppelganger to analyze recent campaigns and explore its technical and organizational structures.

                                                                                                                                                                                                              dti.domaintools.com/research/d

                                                                                                                                                                                                                AodeRelay boosted

                                                                                                                                                                                                                [?]Taran Rampersad » 🌐
                                                                                                                                                                                                                @knowprose@mastodon.social

                                                                                                                                                                                                                Two recent examples show issues with data and digital sovereignty.

                                                                                                                                                                                                                Claude being used to exfil data from the Mexican government.

                                                                                                                                                                                                                'Flying objects' impacting AWS services in Dubai.

                                                                                                                                                                                                                Both likely impacted personal and organizational and cross-national information and services. In one case, definitely national.

                                                                                                                                                                                                                knowprose.com/2026/03/when-dat

                                                                                                                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                  @Steve12L@mamot.fr

                                                                                                                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                  @Steve12L@mamot.fr

                                                                                                                                                                                                                  ⋅ DuckDuckGo Browser UXSS Flaw in Auto Consent JS Bridge Enables Cross-Origin Code Execution

                                                                                                                                                                                                                  cybersecuritynews.com/duckduck

                                                                                                                                                                                                                    [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                                                                                                    @rysiek@mstdn.social

                                                                                                                                                                                                                    Motorola announces a partnership with GrapheneOS Foundation
                                                                                                                                                                                                                    motorolanews.com/motorola-thre

                                                                                                                                                                                                                    > Motorola and the GrapheneOS Foundation will work to strengthen smartphone security and collaborate on future devices engineered with GrapheneOS compatibility.

                                                                                                                                                                                                                    This could be a gamechanger. Congratulations to @GrapheneOS, fingers crossed this works out well!

                                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                                      ⋅ Tire Pressure Systems in Toyota, Mercedes, and Other Major Car Brands Enable Silent Vehicle Tracking

                                                                                                                                                                                                                      cybersecuritynews.com/tire-pre

                                                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                                                        ⋅ HackerBot Claw : le bot IA autonome qui a fait disparaître Trivy de GitHub

                                                                                                                                                                                                                        it-connect.fr/hackerbot-claw-l

                                                                                                                                                                                                                          [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                                                                                                          @rysiek@mstdn.social

                                                                                                                                                                                                                          Heads up for any folks using @hetzner: scammers seem to be trying to exploit the recent bump in pricing by sending "unpaid invoice notification" e-mails.

                                                                                                                                                                                                                          Easy to fall for it before morning coffee.

                                                                                                                                                                                                                          "Update Payment Method" link obviously leads to a scam site, so not particularly hard to spot either.

                                                                                                                                                                                                                          Be careful out there. :blobcatcoffee:

                                                                                                                                                                                                                          P.S. yes I am aware of the shitty ways Hetzner treated a bunch of fedi instances; this is not a recommendation.

                                                                                                                                                                                                                            webhat boosted

                                                                                                                                                                                                                            [?]Pseudo Nym » 🌐
                                                                                                                                                                                                                            @pseudonym@mastodon.online

                                                                                                                                                                                                                            @campuscodi

                                                                                                                                                                                                                            Closer and closer to Daniel Suarez 's "Demon."

                                                                                                                                                                                                                            It doesn't have to be conscious or a person to follow an agenda to accomplish goals in the real world.

                                                                                                                                                                                                                            As this one solicits crypto currency, it's a trivial step to have it supplied with some before launch, and "decide" to deploy money to accomplish physical tasks in the real world.

                                                                                                                                                                                                                            We had that unsuccessful "task rabbit" for bots to hire humans a while ago.

                                                                                                                                                                                                                            Totally doable for bot to bribe a human in an attack.

                                                                                                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                                                                                                              ⋅ 5 IoT Vulnerabilities That Stop Projects and How to Avoid Them

                                                                                                                                                                                                                              hackread.com/5-iot-vulnerabili

                                                                                                                                                                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                @Steve12L@mamot.fr

                                                                                                                                                                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                @Steve12L@mamot.fr

                                                                                                                                                                                                                                ⋅ Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

                                                                                                                                                                                                                                thehackernews.com/2026/02/thou

                                                                                                                                                                                                                                  AodeRelay boosted

                                                                                                                                                                                                                                  [?]Paco Hope [He/Him] » 🌐
                                                                                                                                                                                                                                  @paco@infosec.exchange

                                                                                                                                                                                                                                  I managed to persuade a few very cool folks to join the fediverse.

                                                                                                                                                                                                                                  Their profiles don’t look like much, yet, because some of them were munching on ramen while they signed up and all of us were busy at . But maybe we can light up their feeds a bit and show them that it’s good to be here.

                                                                                                                                                                                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                    @jik@federate.social

                                                                                                                                                                                                                                    I am negotiating an engagement with on behalf of my employer, and I found this buried most of the way down the engagement letter draft they sent me.
                                                                                                                                                                                                                                    wtaf
                                                                                                                                                                                                                                    I replied: "I am uncomfortable with the language in the 'Use of Data' section of the engagement letter. We do not wish to authorize PwC's use of our data, either during or after this engagement, for purposes other than providing to us the contracted services."
                                                                                                                                                                                                                                    We shall see.
                                                                                                                                                                                                                                    (It's an gap assessment.)

                                                                                                                                                                                                                                    12 Use of Data
You agree that we and all members of the PricewaterhouseCoopers global network of firms may use the data we receive from you also for other purposes than for this engagement, i.e. for analysis and development purposes, such as benchmarking, market and cost analyses, and the further development of our technologies, methods, quality standards and services.
In using your data we will ensure,
• that the statutory data protection regulations are observed
• that third parties cannot identify you or your data as a result of the use.

                                                                                                                                                                                                                                    Alt...12 Use of Data You agree that we and all members of the PricewaterhouseCoopers global network of firms may use the data we receive from you also for other purposes than for this engagement, i.e. for analysis and development purposes, such as benchmarking, market and cost analyses, and the further development of our technologies, methods, quality standards and services. In using your data we will ensure, • that the statutory data protection regulations are observed • that third parties cannot identify you or your data as a result of the use.

                                                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                                                      ⋅ ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen

                                                                                                                                                                                                                                      hackread.com/shinyhunters-leak

                                                                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                                                                        ⋅ Researchers Uncover Aeternum C2 Infrastructure with Advanced Persistence and Network Evasion Features

                                                                                                                                                                                                                                        cybersecuritynews.com/research

                                                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                                                          ⋅ ClawJacked Vulnerability in OpenClaw Could Let Websites Hijack AI Agents

                                                                                                                                                                                                                                          hackread.com/openclaw-vulnerab

                                                                                                                                                                                                                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                            @Steve12L@mamot.fr

                                                                                                                                                                                                                                            ⋅ Malicious Chrome Extension Steals Facebook Business Manage 2FA Codes and Analytics Data

                                                                                                                                                                                                                                            cybersecuritynews.com/chrome-e

                                                                                                                                                                                                                                              Gauthier C. boosted

                                                                                                                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                                                                                                                              C'est qui, qui a fuité aujourd'hui ?
                                                                                                                                                                                                                                              Cegedim !

                                                                                                                                                                                                                                              ⋅ Fuite de données médicales, les notes glaçantes des médecins sur leurs patients exposées sur la toile

                                                                                                                                                                                                                                              01net.com/actualites/fuite-de-

                                                                                                                                                                                                                                              Le Pdf est ici :

                                                                                                                                                                                                                                              cegedim.fr/Communique/Cegedim_

                                                                                                                                                                                                                                                [?]Taran Rampersad » 🌐
                                                                                                                                                                                                                                                @knowprose@mastodon.social

                                                                                                                                                                                                                                                Pini boosted

                                                                                                                                                                                                                                                [?]Infoblox Threat Intel » 🌐
                                                                                                                                                                                                                                                @InfobloxThreatIntel@infosec.exchange

                                                                                                                                                                                                                                                We discovered a phishing actor that is abusing .arpa to host content on domains that should not resolve to an IP address. The actor uses free services to create domain names from reverse DNS strings for IPv6 tunnels that use the .arpa top level domain. These domains are unlikely to be blocked, much less scrutinized, by security systems as they aren’t supposed to be used in URLs. But this actor is doing just that. Every day.

                                                                                                                                                                                                                                                We’ve seen a constant flow of phishing emails using these domains as phishing links since last November. The scam uses a toolkit that has been used since at least 2017. Another campaign using the same toolkit leverage hijacked CNAMEs of well-known government agencies, universities, telecommunication companies, media organizations, and retailers from around the world.

                                                                                                                                                                                                                                                In our latest blog, we explain what these actors are doing and how they are doing it. We even share all the indicators we’ve uncovered.

                                                                                                                                                                                                                                                infoblox.com/blog/threat-intel

                                                                                                                                                                                                                                                Processed used by the threat actor to use IPv6 reverse DNS domains in phishing email URLs

                                                                                                                                                                                                                                                Alt...Processed used by the threat actor to use IPv6 reverse DNS domains in phishing email URLs

                                                                                                                                                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                  @Steve12L@mamot.fr

                                                                                                                                                                                                                                                  [?]Sheldon [he/him] » 🌐
                                                                                                                                                                                                                                                  @sysop408@sfba.social

                                                                                                                                                                                                                                                  I'm configuring a Web Application Firewall in China that's clearly been translated into English using translation software instead of human translators.

                                                                                                                                                                                                                                                  Whenever there's a prompt to confirm a choice, it doesn't say "Confirm" or "Acknowledge".

                                                                                                                                                                                                                                                  The button reads "Sure!"

                                                                                                                                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                                                                                                                                    opio ⏚ boosted

                                                                                                                                                                                                                                                    [?]dallo » 🌐
                                                                                                                                                                                                                                                    @dallo@pouet.chapril.org

                                                                                                                                                                                                                                                    [?]Etienne / Tek [he/him] » 🌐
                                                                                                                                                                                                                                                    @tek@todon.eu

                                                                                                                                                                                                                                                    Hey, people, what is your best way to follow threat reports published? Do you have any good RSS feed? Or newsletter?
                                                                                                                                                                                                                                                    (By threat report I mean technical reports, not news articles)

                                                                                                                                                                                                                                                      [?]Jon Yoder » 🌐
                                                                                                                                                                                                                                                      @jonyoder@mstdn.social

                                                                                                                                                                                                                                                      It's an exciting time for the project and Connect continues to show visible improvements. Hit the link to find out more!

                                                                                                                                                                                                                                                      mensago.org/february-2026-news

                                                                                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                                                                                        Dans la série : Vive l' IA (ou pas) !

                                                                                                                                                                                                                                                        ⋅ Cette directrice de Meta a vu toute sa boîte mail supprimée par OpenClaw

                                                                                                                                                                                                                                                        frandroid.com/marques/meta/298

                                                                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                                                                          ⋅ Comment savoir si mes données personnelles ont été piratées ?

                                                                                                                                                                                                                                                          blogdumoderateur.com/comment-s

                                                                                                                                                                                                                                                            [?]ARGVMI~1.PIF » 🌐
                                                                                                                                                                                                                                                            @argv_minus_one@mastodon.sdf.org

                                                                                                                                                                                                                                                            Just found out that automatically fetches web links in messages and plays the page's video if there is one.

                                                                                                                                                                                                                                                            This is not acceptable behavior!!!

                                                                                                                                                                                                                                                            * It's annoying. There isn't any obvious way to stop the video.

                                                                                                                                                                                                                                                            * It's insecure. The linked page might attack vulnerabilities in Beagle's video player.

                                                                                                                                                                                                                                                            * It exposes the user's IP address to anyone who sends them a message, potentially physically endangering them.

                                                                                                                                                                                                                                                            Will uninstall and replace ASAP.

                                                                                                                                                                                                                                                              [?]Jon Yoder » 🌐
                                                                                                                                                                                                                                                              @jonyoder@mstdn.social

                                                                                                                                                                                                                                                              Been working hard on attachment support for messages in Connect lately, and I just implemented basic support for a feature I'm calling Attachment Guard, where a color and number are assigned to a level of risk associated with the kind of attachment(s) a message has. Screenshot below.

                                                                                                                                                                                                                                                              Does this help the way that I hope it does?

                                                                                                                                                                                                                                                              A screenshot of an email program. A smaller window is open, displaying a test message that has several attachments. Each attachment is prepended by a colored box with a number in it.

                                                                                                                                                                                                                                                              Alt...A screenshot of an email program. A smaller window is open, displaying a test message that has several attachments. Each attachment is prepended by a colored box with a number in it.

                                                                                                                                                                                                                                                                David Gerard boosted

                                                                                                                                                                                                                                                                [?]Kim Crawley 😷 (she/her) » 🌐
                                                                                                                                                                                                                                                                @kimcrawley@zeroes.ca

                                                                                                                                                                                                                                                                Although I have a CISSP, I certainly didn't need it to know how horrifying this is.

                                                                                                                                                                                                                                                                But what I think is even worse is that LinkedIn is mostly fucking pathetic bootlickers singing the praises of Copilot and bragging about their "AI skills." 🫠🫠🫠

                                                                                                                                                                                                                                                                @davidgerard

                                                                                                                                                                                                                                                                youtu.be/B0B6hoOE9uo?si=gQLzc0

                                                                                                                                                                                                                                                                  opio ⏚ boosted

                                                                                                                                                                                                                                                                  [?]MissConstrue [She/Her (Crone Extraordinaire)] » 🌐
                                                                                                                                                                                                                                                                  @MissConstrue@mefi.social

                                                                                                                                                                                                                                                                  cybernews.com/security/global-

                                                                                                                                                                                                                                                                  Speaking of ID verification companies being shady, , a global AI-based identity verification and "Know Your Customer" (KYC) solutions provider, left a terabyte of user data and biometrics on the open web. The breach exposed approximately 1 billion to 3 billion personal records across 26 countries, making it a significant event for data privacy in the financial and fintech.

                                                                                                                                                                                                                                                                  Call me Cassandra. 🤷🏻‍♀️🤦‍♀️

                                                                                                                                                                                                                                                                    [?]Genuinely Gary 🌤️ » 🌐
                                                                                                                                                                                                                                                                    @sgtgary@mindly.social

                                                                                                                                                                                                                                                                    Age verification vendor Persona left frontend exposed, researchers say malwarebytes.com/blog/news/202

                                                                                                                                                                                                                                                                    (They aren't stealing your password from these sites, they're stealing your biometric identity)