social.dk-libre.fr is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Search results for tag #infosec

[?]AA » 🌐
@AAKL@infosec.exchange

New.

Wiz: MongoBleed (CVE-2025-14847) exploited in the wild: everything you need to know wiz.io/blog/mongobleed-cve-202 @wiz

    [?]dey » 🌐
    @dey@mastodon.xyz

    Dites la team vous auriez un tuto récent pour faire l'analyse de paquet sur un réseau local?
    Un truc genre wireshark mais peut-être qu'il existe des trucs plus simple à utiliser aujourd'hui.
    J'aimerais voir les infos échangées par un appareil connecté chez moi.

      Evelyn :spinny_cat_trans: :spinny_cat_lesbian: boosted

      [?]BobDaHacker 🏳️‍⚧️ (39C3 ☎️ 24630) » 🌐
      @bobdahacker@infosec.exchange

      🐱 New Blog Post: Petlibro Smart Pet Feeder Vulnerabilities (Partially Fixed, $500)

      Found critical vulns in Petlibro - one of the biggest smart pet feeder companies:

      • Auth bypass via broken OAuth - just need Google ID (public info via Google APIs) to login as anyone
      • Access any pet's data, devices, serial numbers, MAC addresses
      • Hijack any device - change feeding schedules, access cameras
      • Access private audio recordings (mealtime messages to pets)
      • Add yourself as shared owner to any device

      The worst part? They "fixed" the auth bypass by making a new endpoint... but left the old vulnerable one active for "legacy compatibility." Two months later, still working.

      Also tried to get me to sign an NDA AFTER paying the bounty. That's not how contracts work.

      Full writeup: bobdahacker.com/blog/petlibro

        AodeRelay boosted

        [?]LabPlot » 🌐
        @LabPlot@floss.social

        is an tool for and , and its page should reflect its latest features and developments. :boost_love: :wikipedia:

        @labplot@lemmy.kde.social
        @opensource

        If you’re a user or contributor, take a moment to check and update the page.

        Image: Sparklines in LabPlot (published on Wikipedia)

        Alt...Image: Sparklines in LabPlot (published on Wikipedia)

          Kh0lah boosted

          [?]BeyondMachines :verified: » 🤖 🌐
          @beyondmachines1@infosec.exchange

          Ubisoft Rainbow Six Siege servers shut down after multi-group cyberattack

          Ubisoft suffered a multi-vector cyberattack involving up to four hacker groups who claim to have exploited vulnerabilities including MongoBleed to compromise game services, ban players, and exfiltrate decades of internal source code from the company's Git repositories. The breach resulted in unauthorized access to backend systems, exposure of critical software development kits and multiplayer services code, and forced the shutdown of Rainbow Six Siege servers.

          **If you play Rainbow Six Siege or use Ubisoft services, change your Ubisoft password and remove any saved payment methods from your account. Don't click on any emails claiming to be from "Ubisoft Support" asking for passwords or payment info - these are likely phishing attempts exploiting the breach.**

          beyondmachines.net/event_detai

            [?]Konstantin :C_H: » 🌐
            @kpwn@infosec.exchange

            , your go-to place for discussions on the Fediverse and Bluesky, now supports email alerts.

            cvecrowd.com

            Here's how it works:

            - You define one or more alert keywords
            - Keywords are matched against vendor, product, and package names from official CVE data
            - If a post mentions a CVE that matches one of your keywords, you receive an email notification

            Read more below 🧵

              AodeRelay boosted

              [?]Jerrad Dahlager » 🌐
              @jerraddahlager@infosec.exchange

              First post! Glad to be here on infosec.exchange.

              Nine Lives, Zero Trust is live.

              I write about cloud security & the stuff that keeps defenders up at night.

              Three cats taught me nothing should be trusted, especially at 3 AM.

              nineliveszerotrust.com

                Debacle boosted

                [?]BobDaHacker 🏳️‍⚧️ (39C3 ☎️ 24630) » 🌐
                @bobdahacker@infosec.exchange

                🔓 Found critical vulns in Taimi (LGBTQ+ dating app) - all fixed, $10k bounty

                What I found:

                • "Expiring" videos didn't expire, URLs stayed valid forever
                • Decrement attachment ID = anyone's private videos
                • Location feature bypassed photo permission checks (why upload a map preview image through the photo system??)
                • Fake system messages (made a Raid Shadow Legends sponsorship lol)

                The good news: Taimi actually handled this right. Fast response, $10k bounty, everything fixed quickly. No lawyers, no threats.

                This is how disclosure should work. Take notes, Lovense.

                Full writeup: bobdahacker.com/blog/taimi-idor

                  AodeRelay boosted

                  [?]mkj » 🌐
                  @mkj@social.mkj.earth

                  Yesterday was Christmas Eve.

                  What is today? Christmas Mallory? 🤔

                    AodeRelay boosted

                    [?]PLA_906114 » 🌐
                    @PLA_906114@mastodon.illumos.cafe

                    @vermaden

                    Thank you for this valuable insight from the powerful BSD POV
                    This would make hosting for pure personal LAN use fairly affordable and with fairly low HDD power requirements, since you use 30TB 27.28 TiB HDD at a lower HDD count

                    Do you have a link to these 27.28 TiB drives because I haven't seen them yet

                      AodeRelay boosted

                      [?]PLA_906114 » 🌐
                      @PLA_906114@mastodon.illumos.cafe

                      @vermaden

                      It may look like I was joking but making such a backup is technically simple.

                      300TiB / 24TiB per HDD is 12.5 drives

                      300TiB / 16TiB is 18.75 drives

                      In reality it's more complex.
                      A 16TiB HDD is not 16TiB but 16TB lineair

                      Given a typical 4TB HDD I get just 3.64TiB in partitoned EXT4 HDD Space
                      That is 91% of the 4TB HDD

                      At 16TB that is 14.56 TiB {yes the loss is enormous and those hard drive companies are idiots because computer systems count in base² Binary not base10}

                      A 16TB drive is actually a 14.56 TiB Drive, it should be sold as 14.56 TiB not 16TB because that is misleading and false advertisement.

                      With these parameters we will need in reality 300 TiB / 14.56 TiB = 20.6
                      So we will need 21 drives for the task at 14.56 TiB. In the replication you will need twice the amount

                      This would become a JBOD just a bundle of drives, which is the easiest form to concatenate hard drive space to together.

                      A 4U JBOD enclosure can harbour a lot of drives. At the most you will need two.

                      Double the amount if you want a local backup of your main Spotify data.

                      Then you will need a 1U case for the computing System. A typical server motherboard, 1x AMD EPYC CPU, 512GB ram is more than sufficient.

                      You will need Fast Access to the Drive Array. 10GBit / sec in duplo should be enough. That means that your switches cables and network infrastructure will be expensive.

                      The high cost of AC power globally, can be a limiting factor when you have to power 42 hard drives provided that you are a Soho Network Builder, though.

                      That is the only factor you cannot calculate with constants

                      ^Z

                        [?]Metin Seven 🎨 » 🌐
                        @metin@graphics.social

                        [?]Metin Seven 🎨 » 🌐
                        @metin@graphics.social

                        [?]Metin Seven 🎨 » 🌐
                        @metin@graphics.social

                        🧵 Tech-themed works, 39/x

                        Cybersecurity, isometric pixel illustration.

                        Isometric pixel artwork, showing a character sitting behind a laptop, surrounded by security measures, such as a wall and cameras.

                        Alt...Isometric pixel artwork, showing a character sitting behind a laptop, surrounded by security measures, such as a wall and cameras.

                          [?]GeneralX ⏳ » 🌐
                          @generalx@freeradical.zone

                          Azure Engineer @ Human Rights Watch

                            AodeRelay boosted

                            [?]PLA_906114 » 🌐
                            @PLA_906114@mastodon.illumos.cafe

                            @vermaden
                            We should all be grateful for this reference backup creator

                            No we need to fetch a few HDD to make our own backup of that backup

                              opio ⏚ boosted

                              [?]Fedi.Garden ☃️ » 🌐
                              @FediGarden@social.growyourown.services

                              FreeRadical.zone is a Mastodon server themed around infosec and privacy and technology and leftward politics and cats and dogs.

                              This server has been online since 2017.

                              :Fediverse: freeradical.zone

                              You can find out more at freeradical.zone/about or contact the admin account @tek

                                AodeRelay boosted

                                [?]Wael Nasreddine » 🌐
                                @wael@mastodon.nasreddine.com

                                Just published a deep dive on locking down my self-hosted instance on bare metal . 🛡️

                                I used Network Policies to implement a Zero Trust model—blocking internal LAN access while allowing federation. The post covers: ✅ Safely deploying with PolicyAuditMode ✅ Troubleshooting MinIO (toServices vs toEndpoints) ✅ Handling Redis via FQDN

                                Read the full write-up: wael.nasreddine.com/kubernetes

                                  Lien Rag boosted

                                  [?]MissConstrue » 🌐
                                  @MissConstrue@mefi.social

                                  Remember yesterday when I told y’all some of the redactions were easy to remove? The Guardian has words.

                                  People examining documents released by the Department of Justice in the Jeffrey Epstein case discovered that some of the file redaction can be undone with Photoshop techniques, or by simply highlighting text to paste into a word processing file.

                                  Y’all, they used Acrobat. Because the fired all the people who normally sanitize data, and told 1200 agents not trained in infosec to hide anything that might embarrass the , and this is the result.

                                  Have fun y’all, let’s see who we can embarrass.

                                  theguardian.com/us-news/2025/d

                                    [?]Jeff » 🌐
                                    @WarySec@hachyderm.io

                                    Santa texted me and said he's stranded without presents and needs me to buy a bunch of Apple gift cards. I was suspicious, but he ended the text with Ho Ho Ho, so I think it's legit.

                                      DamonHD boosted

                                      [?]Jonathan Kamens 86 47 » 🌐
                                      @jik@federate.social

                                      Q: Are you aware of any anti-counterfeiting measures in scanners in general or Brother scanners in particular which would cause them to refuse to scan checks?
                                      Read on for additional info.
                                      UPDATE: @ireneista figured it out. See adhd.irenes.space/@ireneista/s in the replies.
                                      (1/6)

                                        artlog boosted

                                        [?]OTX Bot » 🤖 🌐
                                        @techbot@social.raytec.co

                                        Webrat, disguised as exploits, is spreading via GitHub repositories

                                        A new malware campaign targeting security professionals and students has been uncovered. The threat actor behind Webrat is now disguising the backdoor as exploits and proof-of-concept code for high-profile vulnerabilities, distributing it through GitHub repositories. The malware, which previously spread via game cheats and cracked software, now aims to infect inexperienced security researchers. The campaign uses carefully prepared repositories with AI-generated vulnerability reports to build trust. The malicious files, when executed, disable Windows Defender, escalate privileges, and fetch the Webrat backdoor. This backdoor can steal data from various applications, perform keylogging, and access webcams and microphones. The attack serves as a reminder for cybersecurity professionals to exercise caution when handling potentially malicious files and to use isolated environments for analysis.

                                        Pulse ID: 694ab732eda29a7aec8e476b
                                        Pulse Link: otx.alienvault.com/pulse/694ab
                                        Pulse Author: AlienVault
                                        Created: 2025-12-23 15:37:21

                                        Be advised, this data is unverified and should be considered preliminary. Always do further verification.

                                          [?]Jonathan Kamens 86 47 » 🌐
                                          @jik@federate.social

                                          Well, this isn't good.
                                          "US insurance giant Aflac says hackers stole personal and health data of 22.6 million"
                                          techcrunch.com/2025/12/23/us-i

                                            AodeRelay boosted

                                            [?]Anthony » 🌐
                                            @abucci@buc.ci

                                            Slack's signin procedure is the digital equivalent of boarding an airplane, "security"wise.

                                            One of my favorite "security challenges" is the "verify your email" one. By this point my email has been verified so many times it should have top secret clearance.


                                              opio ⏚ boosted

                                              [?]Ange des ténèbres 🐈 » 🌐
                                              @angedestenebres@mastodon.tedomum.net

                                              Un simple et bon conseil : Ne pas utiliser de / agentiques.

                                              : les injections de prompts resteront « un défi pour de nombreuses années »

                                              Si OpenAI veut montrer qu’elle prend le problème des attaques par injection très au sérieux, elle reconnait dans le même temps qu’il ne sera probablement jamais circonscrit.

                                              next.ink/215914/openai-les-inj

                                                AodeRelay boosted

                                                [?]Brian Greenberg :verified: » 🌐
                                                @brian_greenberg@infosec.exchange

                                                This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.

                                                The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.

                                                Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways no one quite imagined. The tools aren’t broken. The assumptions are.

                                                There’s no dramatic fix here, only mildly annoying advice that suddenly feels urgent. Review recovery settings. Lock down account changes. Use passkeys. Because once an attacker controls the recovery layer, proving you’re you can become surprisingly difficult.

                                                TL;DR
                                                🧠 Family safety tools are being weaponized
                                                ⚡ Account recovery can be shut down entirely
                                                🎓 Legitimate features enable the lockout
                                                🔍 Prevention matters more than appeals

                                                forbes.com/sites/daveywinder/2

                                                  [?]Jonathan Kamens 86 47 » 🌐
                                                  @jik@federate.social

                                                  I'm not sure what to think about an company, specifically , running a web crawler (see internet-census.org/) which lies in its user-agent string and doesn't provide instructions for blocking it via robots.txt (which presumably means that it ignores robots.txt).
                                                  Actually on second thought, I _am_ sure what to think about this: it's shitty behavior and suggests that BitSight is a shitty company.

                                                    Remi Gacogne boosted

                                                    [?]F. Maury ⏚ » 🌐
                                                    @x_cli@infosec.exchange

                                                    Many providers using SSH do not check the SSH host key... they just run with ssh.InsecureIgnoreHostKey...

                                                    And to be honest, it is partly the fault of the SSH standard library which makes it super easy to ignore the host key and does not provide any useful builtin key verification function. People are lazy. ssh.FixedHostKey is niche.

                                                    So I implemented a small library to verify SSH host keys. It builds a verification function using your known_hosts file, another one of your choice, known_hosts entries or SSHFP records queried over classic DNS, DNS over TLS or DNS over HTTPS.

                                                    codeberg.org/X_Cli/sshhostkey

                                                    Cheers! 🥳

                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                      @Steve12L@mamot.fr

                                                      opio ⏚ boosted

                                                      [?]TechNadu » 🌐
                                                      @technadu@infosec.exchange

                                                      EU Chat Control 2.0 returns as Going Dark / ProtectEU - aiming for lawful access to encrypted data and possibly VPN services.

                                                      Expanded metadata retention also under discussion.

                                                      Full Article:
                                                      technadu.com/eu-chat-control-2

                                                      Where should the line be drawn?

                                                      EU Chat Control 2.0 Evolves into Going Dark Initiative – Everything You Need to Know

                                                      Alt...EU Chat Control 2.0 Evolves into Going Dark Initiative – Everything You Need to Know

                                                        🗳

                                                        [?]F. Maury ⏚ » 🌐
                                                        @x_cli@infosec.exchange

                                                        You are an experienced Dev(Sec)Ops. How well do you know Kubernetes?

                                                        I am an expert. I can run my own cluster and maintain it in time:12
                                                        I use Kubernetes well, but I don't run it myself. I use hosted platforms.:8
                                                        I know a bit about Kubernetes, but I don't use it that often.:11
                                                        I am not knowledgeable on Kubernetes. Just the general idea.:24
                                                        Kubernetes?:5

                                                        Closed

                                                          [?]pheonix » 🌐
                                                          @pheonix@hachyderm.io

                                                          A commercial VPN does not protect you from Google, Facebook or browser fingerprinting. It does not stop your country's version of NSA. All it does is shift your trust from your ISP (who you pay) to a random company (who you also pay, but has no oversight). If you are buying a VPN for privacy rather than just geolocation spoofing or torrenting, you have been sold a bridge.

                                                            [?]Fabio Natali @ 39c3 » 🌐
                                                            @fnat@social.coop

                                                            I've been enquiring about upgrading my company's certification to CE Plus, which would involve undergoing an actual audit by a third-party organisation. The auditing company I spoke to said I would need to install a proprietary endpoint detection thingy (from Qualys...?), which I would be extremely reluctant to do. I wonder if I could use an open-source alternative instead, perhaps one of the Greenbone open-source products...

                                                              [?]kravietz 🦇 » 🌐
                                                              @kravietz@agora.echelon.pl

                                                              #RoundCube #webmail admins brace for CVE-2025-68461, remote (!) mailbox takeover exploited by a single email sent to the victim using #XSS

                                                              #infosec

                                                                [?]pheonix » 🌐
                                                                @pheonix@hachyderm.io

                                                                The federated feed is great, but I want to follow more experts who are deep in the weeds.

                                                                Tag a Mastodon account that posts high-quality content about:

                                                                • Reverse Engineering
                                                                • Vintage Computing
                                                                • Network Security
                                                                • Accessibility / UX
                                                                • Privacy
                                                                • Enshittification
                                                                • Art
                                                                • Photography

                                                                Who is your favorite "must-follow" account that deserves more eyes?

                                                                  Taggart boosted

                                                                  [?]AA » 🌐
                                                                  @AAKL@infosec.exchange

                                                                  [?]Tom » 🌐
                                                                  @pertho@mastodon.bsd.cafe

                                                                  This might be a bit of a long shot, but does anyone have some great examples of questions and answers pertaining to and that you'd get, as a company from your clients?

                                                                  I know in the past I've had clients ask for stuff like longer log or backups retention, etc. but what sorts of questions are usually expected?

                                                                  Thanks very much in advance and please boost far and wide!

                                                                    R boosted

                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                    @Steve12L@mamot.fr

                                                                    La CAF victime d'une fuite massive de données de 8,6 millions de Français

                                                                    generation-nt.com/actualites/c

                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                      @Steve12L@mamot.fr

                                                                      [?]Mike Sheward » 🌐
                                                                      @SecureOwl@infosec.exchange

                                                                      Here is a brief summary of the AI/AI adjacent vulnerability-types I've noted in pen tests over the last year (some are AI specific, others could happen with any software project, I just happened to have found them in the context of an AI one):

                                                                      - code injection type things: in order to better understand how they are making decisions, pretty much everything you send to an LLM is logged. I've had more than one successful SSRF this year simply by including code, or a link to code in my LLM convo. Sometimes it's self inflicted, in real time, other times it happens hours later when a human is reviewing the logs and wondering wtf is going on.

                                                                      - mixing in outside knowledge: was able to get what was a closed loop transcription tool to go look something up and put it in the transcription. Could likely be used maliciously.

                                                                      - Github storage of training data: for some reason, AI-tool developers seem intent on storing emails, documents, spreadsheets, whatever it is they are training their stuff on in public Github repos. Have easily found 8 or 9 examples of this in 2025.

                                                                      - letting the AI do authorization: if you give AI access to 'all of the data' and expect it to self manage who is authorized to see what based on a prompt, you are in for a bad day/week/month. People are doing this.

                                                                      - Exposure of third party Oauth tokens etc: Most of these agents etc are connecting to things like Google Workspace, Exchange, to read emails, documents etc. For some reason, people seem to do a very poor job of protecting the tokens that they give the AI. I can think of two examples this year where those tokens were readily accessible in an API response.

                                                                        [?]Mark Wyner Won’t Comply :vm: » 🌐
                                                                        @markwyner@mas.to

                                                                        It’s interesting how many people think wanting privacy means you’re doing something nefarious. The fact is, privacy is about sharing what you want with whom you choose.

                                                                        (I don’t recall who wrote these words or where I originally saw them. I only made the graphic.)

                                                                        Illustration of some eyes looking straight at you followed by text that reads “I need privacy, not because my actions are questionable. But because your judgment and intentions are.”

                                                                        Alt...Illustration of some eyes looking straight at you followed by text that reads “I need privacy, not because my actions are questionable. But because your judgment and intentions are.”

                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                          @Steve12L@mamot.fr

                                                                          Apple Leak Confirms Work on Foldable iPhone, AirTag 2, and Dozens More Devices

                                                                          macrumors.com/2025/12/15/apple

                                                                            ypeter boosted

                                                                            [?]LittleAlex 🇺🇦🇮🇱🇩🇪🇳🇴 » 🌐
                                                                            @littlealex@infosec.exchange

                                                                            Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

                                                                            After years of exploiting zero-day and n-day vulnerabilities, Russian state-sponsored threat actors are shifting to misconfigured devices.

                                                                            securityweek.com/amazon-russia

                                                                              [?]FlohEinstein (DECT: 3564) » 🌐
                                                                              @FlohEinstein@chaos.social

                                                                              Ran into a problem in prod?
                                                                              Just generate a fake cloudflare error page and blame it on them - gives you time to fix.

                                                                              github.com/donlon/cloudflare-e

                                                                              Editor to generate a fake internal server error page complete with You, Cloud, Server in red and green

                                                                              Alt...Editor to generate a fake internal server error page complete with You, Cloud, Server in red and green

                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                @Steve12L@mamot.fr

                                                                                [?]Jonathan Kamens 86 47 » 🌐
                                                                                @jik@federate.social

                                                                                Some bro in Israel just reached out to me cold on and asked if I could spare 15 minutes to give him feedback about the product idea his new stealth startup is working on.
                                                                                This is how I responded.

                                                                                That depends. Have you said anything publicly critical of the genocide your country's government is perpetrating in Gaza and the West Bank?
If not, then no.

Just as I think it is morally incumbent upon Americans to speak up against the fascist shit Trump and his administration are doing, I think it is morally incumbent upon Israelis to speak up against the fascist shit their government is doing.

I've spoken out publicly about both. How about you?

                                                                                Alt...That depends. Have you said anything publicly critical of the genocide your country's government is perpetrating in Gaza and the West Bank? If not, then no. Just as I think it is morally incumbent upon Americans to speak up against the fascist shit Trump and his administration are doing, I think it is morally incumbent upon Israelis to speak up against the fascist shit their government is doing. I've spoken out publicly about both. How about you?

                                                                                  [?]Natasha 🇪🇺 » 🌐
                                                                                  @Natasha_Jay@tech.lgbt

                                                                                  IT security in the 90s ...

                                                                                  A photograph of a locked transparent case of beige 3.5 inch floppy disks

                                                                                  Alt...A photograph of a locked transparent case of beige 3.5 inch floppy disks

                                                                                    mmu_man boosted

                                                                                    [?]BeyondMachines :verified: » 🤖 🌐
                                                                                    @beyondmachines1@infosec.exchange

                                                                                    Massive 16TB database leaks 4.3 billion professional records

                                                                                    An unsecured 16-terabyte MongoDB database containing approximately 4.3 billion professional records was exposed without authentication from November 23-25, 2025, including names, emails, phone numbers, work histories, and other personally identifiable information. It's suspected that the data set is owned by a data broker or a lead-generation company, but the researchers did not disclose any details.

                                                                                    **Data brokers are just greedy, but not at all good with their data protection. Because it's not their data, it's simply grabbed and abused.**

                                                                                    beyondmachines.net/event_detai

                                                                                      [?]Julie Webgirl » 🌐
                                                                                      @juliewebgirl@mstdn.social

                                                                                      ...

                                                                                      Ok. An app is actually a less secure (no visibilty on the WEBPAGES it's accessing, no way to tell if they're http or https) way of interacting with a website.

                                                                                      What desktops/laptops have is typically not cutting edge cameras. So if you send a selfie from them, it's probably going to be kinda crappy

                                                                                      THEY say it's more difficult to compare with the passport pic but really, we know, they want high quality biometric data to add to your profile

                                                                                      6/

                                                                                      federalregister.gov/documents/

                                                                                        théorie :verified: boosted

                                                                                        [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                        @rysiek@mstdn.social

                                                                                        Here are the four paragraphs of conclusion from that clickbaity piece ("Is Signal safe?") by @protonprivacy about @signalapp that is doing rounds.

                                                                                        1. "Signal remains widely regarded as the gold standard for secure private messaging for very good reasons. The Signal Protocol is extremely secure, and unlike most other apps that use the Signal Protocol, Signal collects almost no metadata from the Signal app."

                                                                                        1/🧵

                                                                                          [?]TechGlimmer » 🌐
                                                                                          @techglimmer@mastodon.social

                                                                                          Passwords are yesterday’s defense. 🔐

                                                                                          Hardware security keys using FIDO2/WebAuthn give you phishing resistant logins with a tap, and they work across major services like Google, Microsoft, and many password managers.​

                                                                                          New TechGlimmer guide explains:

                                                                                          How hardware keys work

                                                                                          Why they are stronger than SMS or app codes

                                                                                          What to look for (USB‑C, NFC, platform support) when choosing a key.​

                                                                                          Read more: techglimmer.io/learn-about-har

                                                                                            [?]OTX Bot » 🤖 🌐
                                                                                            @techbot@social.raytec.co

                                                                                            A Zero-Day Vulnerability in Gogs has been Exploited in the Wild

                                                                                            CVE-2025-8110 is an actively exploited remote code execution vulnerability in the Gogs Git platform caused by a symlink bypass that lets authenticated users overwrite arbitrary files and execute code on the server. The flaw is a bypass of an earlier patch affects internet-exposed Gogs instances and currently has no official fix making mitigation steps such as restricting access and disabling open registration critical.

                                                                                            Pulse ID: 693cadc44709dfbcac1a38ac
                                                                                            Pulse Link: otx.alienvault.com/pulse/693ca
                                                                                            Pulse Author: cryptocti
                                                                                            Created: 2025-12-13 00:05:24

                                                                                            Be advised, this data is unverified and should be considered preliminary. Always do further verification.

                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                              @Steve12L@mamot.fr

                                                                                              Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

                                                                                              thehackernews.com/2025/12/fake

                                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                @Steve12L@mamot.fr

                                                                                                Qui aurait pu prédire ?

                                                                                                Le ministère de l’Intérieur victime d’une cyberattaque

                                                                                                next.ink/brief_article/le-mini

                                                                                                  [?]knoppix » 🌐
                                                                                                  @knoppix95@mastodon.social

                                                                                                  Brave is testing an agentic AI mode with Leo to automate research, comparisons, and summaries 🤖

                                                                                                  Because agentic actions pose risks, it runs in an isolated profile with strict access limits, intent checks, and no user-data training 🔐

                                                                                                  But… is this really safe? What do you think, privacy folks? 👀

                                                                                                  @brave

                                                                                                  🔗 bleepingcomputer.com/news/arti

                                                                                                    🗳

                                                                                                    [?]PalmAndNeedle » 🌐
                                                                                                    @PalmAndNeedle@norden.social

                                                                                                    Based on personal vibes only: much of Fedi is ?

                                                                                                    20:3
                                                                                                    30:0
                                                                                                    40:0
                                                                                                    50+:1

                                                                                                      [?]Wulfy—Speaker to the machines » 🌐
                                                                                                      @n_dimension@infosec.exchange

                                                                                                      @briankrebs

                                                                                                      uses Gemini 2.5 not the latest 3.0 which is only 3 weeks old. Nevertheless, it excels at reasoning tasks (ranked #1) Its got a context window of 1 million tokens, which means one can feed a sizable document into it.

                                                                                                      There is a joke here about reasoning in an unreasoning administration, except there us a reason here, one which most Americans are unable to acknowledge. Destruction of the American state.

                                                                                                      The good news us it's for level IL5 (Sensitive but unclassified) information, which means this clownshow is about to start feeding a whole bunch of classified content into it.
                                                                                                      I'm looking forward to reading future breaches post mortems.

                                                                                                      Also, remember the now abandoned motto "Do no evil"? How much does evil cost?
                                                                                                      $200 million dollars (June contract).
                                                                                                      I vaguely remember a whole bunch of Google employees quitting.

                                                                                                      Finally, do remember that there is absolutely no regulations WHATSOEVER controlling this tech.
                                                                                                      This is nuclear power without safeties.
                                                                                                      Car design without seatbelts and crumplezones
                                                                                                      and
                                                                                                      Food additives with no regulation.
                                                                                                      In fact trump "administration" actively threatened states that tried to make houses about

                                                                                                        opio ⏚ boosted

                                                                                                        [?]Thunderbird: Free Your Inbox » 🌐
                                                                                                        @thunderbird@mastodon.online

                                                                                                        Recently we completed a security audit of Thunderbird Send, our upcoming end-to-end encrypted large file sharing service, with the help of the @ostifofficial and 7ASecurity. Read our summary of the report's findings, and learn how we've acted on these recommendations to be more secure and worthy of the trust our user community places in us.

                                                                                                        blog.thunderbird.net/2025/12/t

                                                                                                          Aldaron boosted

                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                          @Steve12L@mamot.fr

                                                                                                          😂 👍🏼

                                                                                                          En Angleterre, des dizaines de trains mis à l'arrêt à cause d'un hoax généré par IA

                                                                                                          clubic.com/actualite-590875-en

                                                                                                            Kh0lah boosted

                                                                                                            [?]BeyondMachines :verified: » 🤖 🌐
                                                                                                            @beyondmachines1@infosec.exchange

                                                                                                            Qilin ransomware gang claims breach of the Church of Scientology's UK operations

                                                                                                            The Russia-based Qilin ransomware gang claimed responsibility for breaching the Church of Scientology's UK headquarters (AOSH UK), publishing proof-of-access screenshots and internal operational documents dated April-November 2025. The Church of Scientology has declined to comment.

                                                                                                            ****

                                                                                                            beyondmachines.net/event_detai

                                                                                                              AodeRelay boosted

                                                                                                              [?]Dendrobatus Azureus » 🌐
                                                                                                              @Dendrobatus_Azureus@mastodon.bsd.cafe

                                                                                                              It's important to fully patch a new Operating System before you start playing with the OS while being online.

                                                                                                              Due to the nature of the distribution your initial patch will be significantly larger than one of standard MX Linux don't be alarmed; Kali has a beautiful suite of forensic software, which naturally takes space and also needs to be patched

                                                                                                                BohwaZ boosted

                                                                                                                [?]F. Maury ⏚ » 🌐
                                                                                                                @x_cli@infosec.exchange

                                                                                                                Managing files over with Terraform

                                                                                                                broken-by-design.fr/posts/remo

                                                                                                                In this blog post, I document the development of a provider allowing practitioners to manage files over WebDAV.

                                                                                                                This provider uses write-only attributes to handle sensitive content, which increases dramatically the complexity of this provider under the hood. The blog post explains why. There are takeaways and controls to add to your checklist if you are a security auditor.

                                                                                                                  [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                  @jik@federate.social

                                                                                                                  I am admiring the restraint of the reporting I'm seeing of Kohler's false security claims about their toilet-bowl camera. I can't understand how every headline isn't an END-to-end encryption joke. It's right there.

                                                                                                                    AodeRelay boosted

                                                                                                                    [?]Dendrobatus Azureus » 🌐
                                                                                                                    @Dendrobatus_Azureus@mastodon.bsd.cafe

                                                                                                                    I love 💕 how Mata Kali is configured by default;

                                                                                                                    zsh
                                                                                                                    XCFE
                                                                                                                    custom Dark Theme
                                                                                                                    light footprint

                                                                                                                    Since the powerful zsh is the default shell evironment you will fly over the keyboard, esp as a touch typist with all ten fingers

                                                                                                                    kali.org/

                                                                                                                      AodeRelay boosted

                                                                                                                      [?]Dendrobatus Azureus » 🌐
                                                                                                                      @Dendrobatus_Azureus@mastodon.bsd.cafe

                                                                                                                      Taggart boosted

                                                                                                                      [?]Ian Campbell 🏴 » 🌐
                                                                                                                      @neurovagrant@masto.deoan.org

                                                                                                                      From Concealment to Exposure: Understanding the Lifecycle and Infrastructure of APT Domains

                                                                                                                      OH! Excited to dive into this - few places doing deeper & more insightful research than GA Tech & friends.

                                                                                                                      Also gonna note with pride that @DomainTools has 3 citations, and my pal Pawel Foremski from our Research team also has a citation herein!

                                                                                                                      tillsongalloway.com/Atropos_Fi

                                                                                                                        [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                        @rysiek@mstdn.social

                                                                                                                        Hey @simplex is this really your founder? 👀
                                                                                                                        xcancel.com/epoberezkin

                                                                                                                          [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                          @rysiek@mstdn.social

                                                                                                                          [?]David J. Atkinson » 🌐
                                                                                                                          @meltedcheese@c.im

                                                                                                                          @mathewi 4/
                                                                                                                          I’m going to delay elaborating my other concerns about the maturity of vehicles. For now, please consider the following:

                                                                                                                          1. in general, self-driving cars in particular, are not people. These technology systems do not have our human-lived experiences, they do not think like us, even if you believe that thinking is computational. With a few exceptions, such systems have no common sense ability to reason about the world. They don’t understand human behavior the way we do.

                                                                                                                          2. They will not make the same mistakes that humans make while driving. That is not only a requirement, it follows from 1. Instead, they will make their own mistakes. We are already seeing plenty of these. Sure, engineers will grind out most of these, but not all.

                                                                                                                          3. The first two points mean that the behavior of self-driving cars will be difficult to predict in all but the most common vanilla driving situations. People complain about how rigid the current vehicles are at following the law. What? Now you want them to break the law when it is expedient?

                                                                                                                          4. There are a near infinite number of “edge cases” and those are when safe driving is the most difficult — exactly when we want self-driving vehicles to excel. There are too many to test. The complexity of the real-world, specifically edge cases, cannot be simulated in a laboratory. A decade or more experience on the road is required.

                                                                                                                          5. Cars are increasingly connected and computerized, and that makes them a new threat. Any modern car today can be hacked and remotely controlled. AI systems add multiple new attack vectors. Yes, companies are working on security, but so are the bad guys. people will tell you their world is hand-to-hand combat. The more such cars are on the road, the greater the opportunity and attraction for mischief (or worse).

                                                                                                                          The big question is when will we, as a society, feel safe and convinced by the benefits of self-driving cars? That question is a trap, because most people don’t know the details. It is already happening.

                                                                                                                          Speaking as an expert and a grandfather, I will not be putting my grandchildren in the back seat of a self-driving car any time soon.

                                                                                                                            [?]Nonilex » 🌐
                                                                                                                            @Nonilex@masto.ai

                                                                                                                            The Dept’s released a long-awaited report Thursday morning about Secy ’s disclosure of plans for airstrikes in on a chat group. The office simultaneously released a second report on “the use of unclassified networks & non–-controlled electronic messaging systems to discuss sensitive & classified information.”

                                                                                                                            media.defense.gov/2025/Dec/04/

                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                              @Steve12L@mamot.fr

                                                                                                                              opio ⏚ boosted

                                                                                                                              [?]dallo » 🌐
                                                                                                                              @dallo@pouet.chapril.org

                                                                                                                              Fuite de données à Leroy Merlin

                                                                                                                              * Nom et prénom
                                                                                                                              * Numéro de téléphone
                                                                                                                              * Courriel
                                                                                                                              * Adresse postale
                                                                                                                              * Date de naissance
                                                                                                                              * Programme de fidélité

                                                                                                                              bleepingcomputer.com/news/secu

                                                                                                                                [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                @rysiek@mstdn.social

                                                                                                                                Somehow I had missed the November @calyxos status update:
                                                                                                                                calyxos.org/news/2025/11/10/ca

                                                                                                                                Apparently, they are:

                                                                                                                                - finalizing the design of a Hardware Security Module (HSM) signing solution

                                                                                                                                - finalizing the detailed provisioning plan for the signing process

                                                                                                                                - trying to figure out how to sustainably access and publish OS security patches in the face of 's meddling and gradual closing of Android code.

                                                                                                                                Also, they are hiring:
                                                                                                                                job-boards.greenhouse.io/calyx

                                                                                                                                  [?]kravietz 🦇 » 🌐
                                                                                                                                  @kravietz@agora.echelon.pl

                                                                                                                                  I read the serious discussions about ‘who eavesdropped on Ushakov and Dmitriev’ and can’t help but chuckle to myself.

                                                                                                                                  All these deliberations about whether it was the NSA or GCHQ are based on the assumption that Ushakov had to use a secure means of communication. Had to… because why exactly?

                                                                                                                                  Because politicians are renowned for their unwavering commitment to adhering to rules, including #OPSEC? But they are not.

                                                                                                                                  Let us recall the US and European leaders who, in #Ukraine Kyiv in 2013, happily chatted on the phone and were recorded (‘Nuland–Pyatt call’).

                                                                                                                                  Shortly afterwards, Sergei Glazyev from the #Russia presidential administration did the same and was recorded… by the new SBU (‘Glazyev tapes’, much less well-known but much more devastating).

                                                                                                                                  In summary, if one can generalise the concept of high-level politics in #infosec matters, it is that those in power do not apply the rules to themselves and do not learn from their mistakes precisely because they are in power.

                                                                                                                                  In short, Hanlon’s razor applies.

                                                                                                                                    opio ⏚ boosted

                                                                                                                                    [?]Ange des ténèbres 🐈 » 🌐
                                                                                                                                    @angedestenebres@mastodon.tedomum.net

                                                                                                                                    , l’app alternative la plus populaire sur TV, a été détournée pour pousser des mises à jour malveillantes

                                                                                                                                    Une anomalie détectée fin novembre dans une mise à jour de SmartTube a révélé l’intrusion d’un module non documenté dans plusieurs versions signées de l’APK. L’incident a poussé le développeur à reconnaître une compromission de son environnement, et conduit à la refonte complète du projet.

                                                                                                                                    clubic.com/actualite-589720-sm

                                                                                                                                      Taggart boosted

                                                                                                                                      [?]Christoffer S. » 🌐
                                                                                                                                      @nopatience@swecyb.com

                                                                                                                                      Ohh I like this... Aikdo has presented a more detailed analysis of the early steps for the Shai Hulud 2.0 worm.

                                                                                                                                      Attempting to map what steps the original threat actor took to gain a foothold. Useful stuff IMHO

                                                                                                                                      aikido.dev/blog/shai-hulud-2-0

                                                                                                                                        [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                        @rysiek@mstdn.social

                                                                                                                                        Life hack: it's really easy to avoid getting phished by e-mails pretending to be coming from GitHub if you don't use GitHub!

                                                                                                                                        :blobcatthinksmart:

                                                                                                                                          [?]dan_nanni » 🌐
                                                                                                                                          @dan_nanni@mastodon.social

                                                                                                                                          My underrated Linux pick is the lsof command. It tells you exactly which files are open and which processes are using them. Because Linux treats everything as a file, this tiny command ends up being insanely powerful and useful in everyday troubleshooting.

                                                                                                                                          Here are useful lsof command examples 😎👇

                                                                                                                                          Find high-res pdf books with all my related infographics at study-notes.org

                                                                                                                                            0 ★ 0 ↺

                                                                                                                                            [?]oldsysops » 🌐
                                                                                                                                            @oldsysops@social.dk-libre.fr

                                                                                                                                            [?]F. Maury ⏚ » 🌐
                                                                                                                                            @x_cli@infosec.exchange

                                                                                                                                            Mais j'en peux plus des campagnes de sensibilisation au phishing :

                                                                                                                                            linkedin.com/posts/regissenet_

                                                                                                                                            "Ouin, les résultats sont pas top"

                                                                                                                                            Aucune remise en question du principe de ces campagnes alors que MANIFESTEMENT elles ne marchent pas !

                                                                                                                                            Ces campagnes ne servent à rien et les chiffres sont là pour le démontrer. Le problème n'est pas l'utilisateur, mais les mesures techniques et organisationnelles déployées. Au fond, peu importe que l'utilisateur tombe dans le panneau, si les bonnes mesures techniques et organisationnelles ont été mises en place pour qu'il n'y ait aucune conséquence due au piègeage de l'utilisateur. Mettre en place un SSO reposant sur une méthode d'authentification non phishable est un excellent premier pas. Implémenter des procédures séparant les responsabilités et les controles à 4 yeux est également super important.
                                                                                                                                            On ne parviendra jamais à un succès de 100% sur de la sensibilisation et il suffit parfois d'une victime pour pêter tout une boite, alors faut tacler le problème de manière systémique et arrêter de faire chier les utilisateurs et engraisser les boites de conseil.

                                                                                                                                              [?]rk: it’s hyphen-minus actually » 🌐
                                                                                                                                              @rk@mastodon.well.com

                                                                                                                                              > CVE-2025-45311: If a user can execute fail2ban-client with sudo, they can achieve local privilege escalation and command injection via user-modified actions.

                                                                                                                                              In other words: If a user has root privileges they can get root privileges.

                                                                                                                                              The disclosure on PacketStorm is straight up AI stuff, unless I’m missing something obvious. C’mon now.

                                                                                                                                              Flooding the zone.

                                                                                                                                                AodeRelay boosted

                                                                                                                                                [?]Laurent Cheylus » 🌐
                                                                                                                                                @lcheylus@bsd.network

                                                                                                                                                Publication par le CERT-FR @cert_fr d'un document sur l'état de la menace ciblant les téléphones portables et des recommandations pour y faire face cert.ssi.gouv.fr/cti/CERTFR-20

                                                                                                                                                  [?]Etienne / Tek » 🌐
                                                                                                                                                  @tek@todon.eu

                                                                                                                                                  New certificate transparency search tool certkit.io/tools/ct-logs/

                                                                                                                                                    AodeRelay boosted

                                                                                                                                                    [?]Dendrobatus Azureus » 🌐
                                                                                                                                                    @Dendrobatus_Azureus@mastodon.bsd.cafe

                                                                                                                                                    @GrapheneOS @otyugh @straybun @watchfulcitizen

                                                                                                                                                    The French justice department also has a really interesting case against the founder of Telegram

                                                                                                                                                    You can read all about it in the Telegram group that the founder is running

                                                                                                                                                    What's interesting in the case of Telegram is that the French government didn't follow the standard rules of reporting within the Telegram ecosystem

                                                                                                                                                    FR is hostile against privacy in the Digital Realm

                                                                                                                                                    France is falling back into the Dark Ages

                                                                                                                                                      [?]Dendrobatus Azureus » 🌐
                                                                                                                                                      @Dendrobatus_Azureus@mastodon.bsd.cafe

                                                                                                                                                      @GrapheneOS

                                                                                                                                                      It looks like the French government is going in the same direction as the American government

                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                        Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
                                                                                                                                                        arxiv.org/abs/2511.15304

                                                                                                                                                          Remi Gacogne boosted

                                                                                                                                                          [?]Neil Craig » 🌐
                                                                                                                                                          @tdp_org@mastodon.social

                                                                                                                                                          We completely disabled TLS 1.0 & 1.1 on www.bbc.co.uk, www.bbc.com & BBC Account web endpoints today.

                                                                                                                                                          This follows a deprecation (soft-retirement via HTML warning page) period of about a month. Usage was low - ~5-10 RPS - and mostly from crufty old bots/scripts.

                                                                                                                                                          This one change took our TLS rating (on SSLLabs & testssl.sh) from B to A+.

                                                                                                                                                          Next up:
                                                                                                                                                          * Enabling PQC & *Finally *removing 3DES on our in-house CDN
                                                                                                                                                          * Retiring non-FS ciphers

                                                                                                                                                          Screenshot of SSLLabs Server Test report for www.bbc.com showing grade "B"

                                                                                                                                                          Alt...Screenshot of SSLLabs Server Test report for www.bbc.com showing grade "B"

                                                                                                                                                          Screenshot of SSLLabs Server Test report for www.bbc.com showing grade "A"

                                                                                                                                                          Alt...Screenshot of SSLLabs Server Test report for www.bbc.com showing grade "A"

                                                                                                                                                          Screenshot of TestSSL.SH Server Test report for www.bbc.com showing grade "B"

                                                                                                                                                          Alt...Screenshot of TestSSL.SH Server Test report for www.bbc.com showing grade "B"

                                                                                                                                                          Screenshot of TestSSL.SH Server Test report for www.bbc.com showing grade "A"

                                                                                                                                                          Alt...Screenshot of TestSSL.SH Server Test report for www.bbc.com showing grade "A"

                                                                                                                                                            [?]0xC0DEC0DE07E9 » 🌐
                                                                                                                                                            @c0dec0dec0de@hachyderm.io

                                                                                                                                                            So, curl doesn’t integrate with libsecret in any way? I assume that since there’s no discussion on the main mailing list of in the GitHub issues for it that I’m somehow being dumb thinking I want it.
                                                                                                                                                            If the service that I’m authenticating to uses basic auth, and I don’t want to store my passwords in a .netrc in my HOME or pass it in clear on the command-line, what are my best options?
                                                                                                                                                            @bagder

                                                                                                                                                              [?]Laurent Cheylus » 🌐
                                                                                                                                                              @lcheylus@bsd.network

                                                                                                                                                              Le gestionnaire de mots de passe open-source et multiplateforme KeePassXC (version 2.7.9) vient de recevoir sa certification CSPN (Certification de sécurité de premier niveau) délivrée par l'ANSSI cyber.gouv.fr/produits-certifi

                                                                                                                                                                [?]release_candidate » 🌐
                                                                                                                                                                @release_candidate@mastodon.bsd.cafe

                                                                                                                                                                committing-crimes.com/articles

                                                                                                                                                                The infosec hell was never users writing down their password in a post-it stuck to their monitor.

                                                                                                                                                                The true infosec hell is developers trusting centralized repositories of "open source" that nobody reads nor audits.

                                                                                                                                                                Again I have to battle against devs that, for pure convenience and laziness, put users and the company at the mercy of any random of the internet, with the willing to perform a supply chain attack.

                                                                                                                                                                  [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                  @jik@federate.social

                                                                                                                                                                  @mike recently recommended to me @daedalus's weekly newsletter, "The Crux". It covers enterprise tech, the cloud, and infosec. I subscribed last week and just got the first newsletter since subscribing. It is REALLY GOOD and I highly recommend it. Solid content that you won't necessarily see elsewhere. Go here to sign up: pivotnine.com/newsletter/

                                                                                                                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                    @jik@federate.social

                                                                                                                                                                    Thoughts on proposed Massachusetts Consumer Data Privacy Act, H.4746

                                                                                                                                                                    The Massachusetts House version of the privacy act is superior to the Senate version but still has some problems. Also, it has a role to play in reducing privacy-invasive ALPR mass surveillance.

                                                                                                                                                                    blog.kamens.us/2025/11/23/thou

                                                                                                                                                                      [?]David August ❌👑 » 🌐
                                                                                                                                                                      @davidaugust@mastodon.online

                                                                                                                                                                      In case you had not yet seen this elsewhere.

                                                                                                                                                                      screenshot of a 2 post thread: 

@ash.renee411 

Gmail rolled out an update on October 10, 2025, and a lot of people didn't notice what it actually does. 
Google's Gemini can now automatically scan everything in your inbox - emails, attachments, receipts, financial docs, all of it - to train their Al and build ad profiles. 
If you don't want that, you can turn it off. 

1/2 

@ash.renee411 

1. Open Gmail in your browser 
2. Go to All Settings 
3. Under General, scroll to Smart features and personalization 
4. Uncheck the box 
5. Then go to Google Workspace → Smart features → Manage Workspace and toggle off both smart-feature settings. 

That's it - you've opted out. 

2/2

                                                                                                                                                                      Alt...screenshot of a 2 post thread: @ash.renee411 Gmail rolled out an update on October 10, 2025, and a lot of people didn't notice what it actually does. Google's Gemini can now automatically scan everything in your inbox - emails, attachments, receipts, financial docs, all of it - to train their Al and build ad profiles. If you don't want that, you can turn it off. 1/2 @ash.renee411 1. Open Gmail in your browser 2. Go to All Settings 3. Under General, scroll to Smart features and personalization 4. Uncheck the box 5. Then go to Google Workspace → Smart features → Manage Workspace and toggle off both smart-feature settings. That's it - you've opted out. 2/2

                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                        The AI Act Whistleblower Tool is a secure channel set up by the European AI Office for individuals who wish to anonymously report potential breaches of the AI Act, thereby contributing to the safe and transparent development of AI technologies.

                                                                                                                                                                        ai-act-whistleblower.integrity

                                                                                                                                                                          [?]FlohEinstein (DECT: 3564) » 🌐
                                                                                                                                                                          @FlohEinstein@chaos.social

                                                                                                                                                                          Which version best conveys the message "ISO 8601. Every over date/time format is inferior"?
                                                                                                                                                                          Based on different versions of the original logo I made multiple attempts. One of them will become a sticker. White on red, Blue on White or White on Blue?

                                                                                                                                                                          3 different versions of the same logo.
1st version: The current ISO logo with the a very simple grid of of globe, the text ISO 8601 in the center and the title ultras in an aggressive sports team like font below. Red background, white structures and text
2nd version: The ISO 9001 style logo logo with the a simple grid of of globe, the text ISO 8601 in the center and the title ultras in an aggressive sports team like font below. White background, light blue structures and text
3rd version: The old ISO logo with the a simple grid of of globe, the text ISO 8601 in the center and the title ultras in an aggressive sports team like font below. Blue background, white structures and text

                                                                                                                                                                          Alt...3 different versions of the same logo. 1st version: The current ISO logo with the a very simple grid of of globe, the text ISO 8601 in the center and the title ultras in an aggressive sports team like font below. Red background, white structures and text 2nd version: The ISO 9001 style logo logo with the a simple grid of of globe, the text ISO 8601 in the center and the title ultras in an aggressive sports team like font below. White background, light blue structures and text 3rd version: The old ISO logo with the a simple grid of of globe, the text ISO 8601 in the center and the title ultras in an aggressive sports team like font below. Blue background, white structures and text

                                                                                                                                                                            [?]der.hans » 🌐
                                                                                                                                                                            @lufthans@mastodon.social

                                                                                                                                                                            Needed 4 random characters for my PIN, so chose Samwise Gamgee, Rose Tyler, Zoë Boutin-Perry and Hawkeye Pierce

                                                                                                                                                                            Had to replace Zoë with her mom Jane because the server couldn't handle umlauts

                                                                                                                                                                              [?]Jon Yoder » 🌐
                                                                                                                                                                              @jonyoder@mstdn.social

                                                                                                                                                                              AodeRelay boosted

                                                                                                                                                                              [?]Soatok Dreamseeker » 🌐
                                                                                                                                                                              @soatok@furry.engineer

                                                                                                                                                                              Moving Beyond the NPM elliptic Package

                                                                                                                                                                              If you're in a hurry, head on over to soatok/elliptic-to-noble and follow the instructions in the README in order to remove the elliptic package from your project and all dependencies in node_modules. Art: CMYKat Why replace the elliptic package? Yesterday, the Trail of Bits blog published a post about finding cryptographic bugs in the elliptic library (a Javascript package on NPM) by using the Wycheproof.

                                                                                                                                                                              soatok.blog/2025/11/19/moving-

                                                                                                                                                                                BrianKrebs boosted

                                                                                                                                                                                [?]AA » 🌐
                                                                                                                                                                                @AAKL@infosec.exchange

                                                                                                                                                                                New.

                                                                                                                                                                                Google Threat Intelligence Group: Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks cloud.google.com/blog/topics/t

                                                                                                                                                                                  Taggart boosted

                                                                                                                                                                                  [?]AA » 🌐
                                                                                                                                                                                  @AAKL@infosec.exchange

                                                                                                                                                                                  New.

                                                                                                                                                                                  Threat Fabric: Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption threatfabric.com/blogs/sturnus

                                                                                                                                                                                  More:

                                                                                                                                                                                  The Hacker News: New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices thehackernews.com/2025/11/new- @thehackernews

                                                                                                                                                                                    [?]Paco Ho Ho Hope 🎄 » 🌐
                                                                                                                                                                                    @paco@infosec.exchange

                                                                                                                                                                                    This is a fascinating use of a #sidechannel timing attack against calls to an #AI model.

                                                                                                                                                                                    By capturing encrypted TLS traffic and measuring timing, they can very accurately determine which streams corresponded to an LLM conversation about a pre-selected topic.

                                                                                                                                                                                    TLS is intact. So their ability to recover the conversation is limited to their ability to break TLS. But they can, with high confidence, sift out all the TLS traffic for the only conversations that reference the thing they care about. They don't have to worry about spending resources breaking TLS on traffic that is unrelated. Neat research from .

                                                                                                                                                                                      Martouf boosted

                                                                                                                                                                                      [?]BeyondMachines :verified: » 🤖 🌐
                                                                                                                                                                                      @beyondmachines1@infosec.exchange

                                                                                                                                                                                      Cloudflare outage brings down major websites Including Twitter, ChatGPT, and Spotify

                                                                                                                                                                                      Cloudflare experienced a six-hour global outage on November 18, 2025, affecting hundreds of thousands of websites and critical services worldwide (including ChatGPT, Claude AI, Spotify, and McDonald's systems) after an oversized configuration file in its Bot Management system crashed traffic routing software across its network. The company reports that the incident was an internal technical failure and not a cyberattack.

                                                                                                                                                                                      ****

                                                                                                                                                                                      beyondmachines.net/event_detai

                                                                                                                                                                                        [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                        @jik@federate.social

                                                                                                                                                                                        My dad just called to ask for his computer's admin password. He fell for yet another fraudulent charge and gave the scammer access to his computer. The scammer was stopped by the fact that I've revoked Dad's admin rights for just this reason.
                                                                                                                                                                                        He has fallen repeatedly for this scam and others like it. We keep telling him it's a scam. We keep telling him to call us before calling any number he gets in an email. He keeps falling for it. It's infuriating.

                                                                                                                                                                                        1/2

                                                                                                                                                                                          [?]Scott Wilson » 🌐
                                                                                                                                                                                          @scottwilson@infosec.exchange

                                                                                                                                                                                          @boblord I have been using DNS-over-HTTPS (DoH) for a few years. I believe it’s the most available and highest compatible method for modern browsers.

                                                                                                                                                                                          @da_667 is a lot smarter than me and I believe he’s against DoH and other encrypted DNS like DNS-over-TLS (DoT) because they prevent network troubleshooting.

                                                                                                                                                                                          This link gives some updated information.

                                                                                                                                                                                          controld.com/blog/dns-over-tls

                                                                                                                                                                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                            @Steve12L@mamot.fr

                                                                                                                                                                                            Prekey Pogo: Investigating Security and Privacy Issues
                                                                                                                                                                                            in WhatsApp’s Handshake Mechanism

                                                                                                                                                                                            arxiv.org/pdf/2504.07323

                                                                                                                                                                                              [?]Mike Sheward » 🌐
                                                                                                                                                                                              @SecureOwl@infosec.exchange

                                                                                                                                                                                              As LLM’s take over the world, a reminder that you can still buy hand crafted, small batch collections of words.

                                                                                                                                                                                              Stand out from the crowd this holiday season with a Mike Sheward InfoSec book - written the old fashioned way - by hand, and fueled by an undying rage that can only exsist in someone who uses JIRA.

                                                                                                                                                                                              Available wherever you buy books and also Walmart for some reason.

                                                                                                                                                                                              Learn more at infosecdiaries.com.

                                                                                                                                                                                              a collection of Mike Sheward Books under a festive fern

                                                                                                                                                                                              Alt...a collection of Mike Sheward Books under a festive fern

                                                                                                                                                                                                [?]ZeroDay Bae » 🌐
                                                                                                                                                                                                @cyberseckyle@infosec.exchange

                                                                                                                                                                                                Chrome now wants to store and autofill your driver’s license and other ID info.

                                                                                                                                                                                                From a cybersecurity perspective, that is a hard no from me. Info-stealer malware already targets browser autofill, and you cannot rotate a driver’s license number like a password. Putting high value IDs in the most targeted consumer app on the planet is a bad trade for a little convenience.

                                                                                                                                                                                                I wrote up why this feature is such a risky idea and what I recommend instead:

                                                                                                                                                                                                🔗 kylereddoch.me/blog/chromes-ne

                                                                                                                                                                                                  [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                  @jik@federate.social

                                                                                                                                                                                                  They say "no sensitive information" was compromised, after a data breach involving real names, email addresses, phone numbers, and physical addresses.
                                                                                                                                                                                                  That's some serious bullshit right there.
                                                                                                                                                                                                  That is, in fact, "sensitive information," you idiots.

                                                                                                                                                                                                  DoorDash confirms data breach impacting users’ phone numbers and physical addresses | TechCrunch
                                                                                                                                                                                                  techcrunch.com/2025/11/17/door

                                                                                                                                                                                                    [?]Tom » 🌐
                                                                                                                                                                                                    @pertho@mastodon.bsd.cafe

                                                                                                                                                                                                    Anyone know of a good curated list of JA3 fingerprints of known shitty bots? (Think: Alibaba, Tencent, AI slop, etc)

                                                                                                                                                                                                    The only two I could find are:

                                                                                                                                                                                                    f79b6bad2ad0641e1921aef10262856b
                                                                                                                                                                                                    5cc600468c246704e1699c12f51eb3ab

                                                                                                                                                                                                      [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                      @jik@federate.social

                                                                                                                                                                                                      My experiment using a all the time ends in five days. My annual subscription to the VPN I was using, Plus, expires this week, and I am electing to not renew and go back to a VPN-free existence.
                                                                                                                                                                                                      As to why, you need only look at my posts over the past year with the hashtag. TLDR: Too many sites break if you use a VPN, it's a huge pain in the ass, and the privacy benefit virtually evaporates if you have to regularly turn off the VPN to make sites work.
                                                                                                                                                                                                      1/2

                                                                                                                                                                                                        [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                        @jik@federate.social

                                                                                                                                                                                                        I'm not thrilled, as some are, that images have been ruled public records.
                                                                                                                                                                                                        As the article says, that means anybody can Flock records ABOUT ANYONE.
                                                                                                                                                                                                        So we're going from "the police can use Flock to spy on you" to "ANYONE can use Flock to spy on you."
                                                                                                                                                                                                        The article says this will make people reconsider whether we want these cameras operating. (1) I doubt that'll come to anything, and (2) what about in the meantime?
                                                                                                                                                                                                        This is quite dangerous.

                                                                                                                                                                                                        Ref: 404media.co/judge-rules-flock-

                                                                                                                                                                                                          [?]Paco Ho Ho Hope 🎄 » 🌐
                                                                                                                                                                                                          @paco@infosec.exchange

                                                                                                                                                                                                          I have to admit, I see the domain hackerone dot com and in my head it rhymes with macaroni dot com.

                                                                                                                                                                                                            🗳

                                                                                                                                                                                                            [?]GeneralX ⏳ » 🌐
                                                                                                                                                                                                            @generalx@freeradical.zone

                                                                                                                                                                                                            How much do you tinker with the privacy settings in messaging apps?

                                                                                                                                                                                                            There's privacy settings??!:4
                                                                                                                                                                                                            l ensure read receipts are off:8
                                                                                                                                                                                                            I ensure typing notifications are off:7
                                                                                                                                                                                                            I turn as much as possible off:14

                                                                                                                                                                                                              [?]🦠Toxic Flange (Gurjeet)🔬⚱️🌚 » 🌐
                                                                                                                                                                                                              @Toxic_Flange@infosec.exchange

                                                                                                                                                                                                              RE: infosec.exchange/@halifaxbside

                                                                                                                                                                                                              Even if you haven’t gone please consider filling out our survey so we can improve and serve the community better!

                                                                                                                                                                                                                Jé Robino boosted

                                                                                                                                                                                                                [?]:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉 » 🌐
                                                                                                                                                                                                                @nemo@mas.to

                                                                                                                                                                                                                BADBOX firmware backdoors: a global risk lurking in some Android devices. A warning about supply-chain threats and clever fraud schemes that misuse devices as proxies. Stay vigilant and verify certifications. 🔒📱💡 gbhackers.com/badbox-firmware-

                                                                                                                                                                                                                  [?]ARGVMI~1.PIF » 🌐
                                                                                                                                                                                                                  @argv_minus_one@mastodon.sdf.org

                                                                                                                                                                                                                  @GossiTheDog

                                                                                                                                                                                                                  Yeah, my mom almost got duped by one of these full-screen phishing sites.

                                                                                                                                                                                                                  It even somehow disabled the Esc key! I told her to try a bunch of keyboard shortcuts to escape from it. Command+W (it's a Mac) finally worked.

                                                                                                                                                                                                                  Memorizing that shortcut should NOT have been necessary!!!

                                                                                                                                                                                                                  full-screen APIs should still show a bit of browser chrome at the top of the screen so you know you're looking at, and have a way to escape from, a full-screen web page.

                                                                                                                                                                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                    @jik@federate.social

                                                                                                                                                                                                                    "Your experience is important to us." Specifically, it's important to us that you allow us to ruin your experience.
                                                                                                                                                                                                                    Get the fuck out of here with that bullshit.

                                                                                                                                                                                                                    A screenshot showing an article on mlive.com, but you can't see the article because it's blocked by a big pop-up preventing you from accessing the page unless you disable your ad blocker.

                                                                                                                                                                                                                    Alt...A screenshot showing an article on mlive.com, but you can't see the article because it's blocked by a big pop-up preventing you from accessing the page unless you disable your ad blocker.

                                                                                                                                                                                                                      [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                      @jik@federate.social

                                                                                                                                                                                                                      Possible boudoir photo shoot [SENSITIVE CONTENT]

                                                                                                                                                                                                                      @superball @APBBlue Paranoid guy here, seconding the motion to be aggressive about inquiring into the security and privacy practices of whoever takes these photos.
                                                                                                                                                                                                                      Ideally, they should never go into the cloud, you should get both the original images and the images edited by the photographer, and they should delete them completely from their systems once you've paid and the images have been delivered to you.

                                                                                                                                                                                                                        Gauthier C. boosted

                                                                                                                                                                                                                        [?]BeyondMachines :verified: » 🤖 🌐
                                                                                                                                                                                                                        @beyondmachines1@infosec.exchange

                                                                                                                                                                                                                        Container escape vulnerabilities discovered in runC container runtime

                                                                                                                                                                                                                        Three high-severity vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881, all CVSS 8.2) in runC container runtime enable attackers to escape container isolation and gain root access on host systems through mount race conditions and procfs manipulation, affecting Docker, Kubernetes, and major cloud platforms.

                                                                                                                                                                                                                        **If you're running Docker, Kubernetes, or any containerized environments, plan an update it to pull the latest runC to version 1.2.8, 1.3.3, or 1.4.0-rc.3 or later. There is a possible exploit that lets attackers escape containers and take full control of your host systems with root privileges. It's not trivial, but why wait for hackers to find a way in. In the meantime, scan your Dockerfiles and use only Dockerfiles from trusted sources.**

                                                                                                                                                                                                                        beyondmachines.net/event_detai

                                                                                                                                                                                                                          [?]Simon Zerafa (Status: 🙂🤧🖥️🪛{🌷🙂‍↔️}) » 🌐
                                                                                                                                                                                                                          @simonzerafa@infosec.exchange

                                                                                                                                                                                                                          Sunday Trivia Question:

                                                                                                                                                                                                                          What is this object? 🤔

                                                                                                                                                                                                                          Describe it's cultural importance in the history of computing 😌🤷‍♂️

                                                                                                                                                                                                                          A white ceramic teapot sits on a patterned table surface.

The teapot is round with a curved handle and a spout. The lid is also white and curved, fitting snugly on top of the body of the teapot. T

he table beneath has a light green background with a grid-like pattern of darker green and white squares. 

Parts of other objects, like a chair and bottles, are visible in the background, slightly out of focus.

Provided by @altbot@fuzzies.wtf, generated privately and locally using Gemma3:27b

🌱 Energy used: 0.084 Wh

                                                                                                                                                                                                                          Alt...A white ceramic teapot sits on a patterned table surface. The teapot is round with a curved handle and a spout. The lid is also white and curved, fitting snugly on top of the body of the teapot. T he table beneath has a light green background with a grid-like pattern of darker green and white squares. Parts of other objects, like a chair and bottles, are visible in the background, slightly out of focus. Provided by @altbot@fuzzies.wtf, generated privately and locally using Gemma3:27b 🌱 Energy used: 0.084 Wh

                                                                                                                                                                                                                            [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                            @jik@federate.social

                                                                                                                                                                                                                            Yet another website ("Olo" online ordering app for restaurants) that refuses to work over a and lies about it.
                                                                                                                                                                                                                            (Text of the screenshot in the replies, since it's too long for alt text)
                                                                                                                                                                                                                            🧵1/7

                                                                                                                                                                                                                            Screenshot of a web feedback form.
Subject: "How you lost me as a customer"
Message in the replies to this post, since it's too long to fit here in the alt text.

                                                                                                                                                                                                                            Alt...Screenshot of a web feedback form. Subject: "How you lost me as a customer" Message in the replies to this post, since it's too long to fit here in the alt text.

                                                                                                                                                                                                                              [?]FLOX Advocate » 🌐
                                                                                                                                                                                                                              @FLOX_advocate@floss.social

                                                                                                                                                                                                                              Final round of SeaGL talks in 30 min:

                                                                                                                                                                                                                              * GNU/Linux Loves All from Timmy James Barnett

                                                                                                                                                                                                                              * Let's create our own tech jobs together following open source principles from Jocelyn Graf

                                                                                                                                                                                                                              * No More Mystery Brownies: SBOMs, security errata, and the recipe for safer software from Brady Dibble

                                                                                                                                                                                                                              pretalx.seagl.org/2025/talk/

                                                                                                                                                                                                                              Join freely and anonymously - seagl.org/attend

                                                                                                                                                                                                                                AodeRelay boosted

                                                                                                                                                                                                                                [?]BeyondMachines :verified: » 🤖 🌐
                                                                                                                                                                                                                                @beyondmachines1@infosec.exchange

                                                                                                                                                                                                                                Mack Energy Corporation hit by ransomware attack

                                                                                                                                                                                                                                Mack Energy Corporation suffered a ransomware attack detected on July 9, 2025, claimed by the Cicada3301 group, which allegedly stole approximately 3.1 terabytes of sensitive data including full names and Social Security numbers. The breach affected at least 413 individuals in Texas but the total number of affected individuals is not disclosed.

                                                                                                                                                                                                                                ****

                                                                                                                                                                                                                                beyondmachines.net/event_detai

                                                                                                                                                                                                                                  Damien :vegan: boosted

                                                                                                                                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                  @Steve12L@mamot.fr

                                                                                                                                                                                                                                  Gemini sait maintenant farfouiller dans les emails et les documents persos pour faire des recherches approfondies

                                                                                                                                                                                                                                  01net.com/actualites/gemini-sa

                                                                                                                                                                                                                                  Que pourrait-il mal se passer ?

                                                                                                                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                                                                                                                    AodeRelay boosted

                                                                                                                                                                                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                    @jik@federate.social

                                                                                                                                                                                                                                    tfw you can't get the verification code sent by your health insurance company to your email because the IP address it's coming from is listed in Spamhaus AND the email they're sending violates their enforcing DMARC policy. *sigh*

                                                                                                                                                                                                                                      [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                                                                                      @brian_greenberg@infosec.exchange

                                                                                                                                                                                                                                      Another Windows update, another fire drill. This time, the October 2025 update is kicking some users into BitLocker recovery mode, and if you don’t know where your recovery key lives, you could lose everything. What’s wild is that BitLocker is actually doing its job. The update just forgot to tell it to chill during reboot. It’s another reminder that the line between “secure” and “unusable” is thinner than most realize.

                                                                                                                                                                                                                                      TL;DR
                                                                                                                                                                                                                                      ⚠️ October update breaks BitLocker flow
                                                                                                                                                                                                                                      🔐 Missing key = locked-out data
                                                                                                                                                                                                                                      🧠 Recovery key sits in your MS account
                                                                                                                                                                                                                                      💡 Enterprise fix requires IT rollout

                                                                                                                                                                                                                                      forbes.com/sites/zakdoffman/20

                                                                                                                                                                                                                                        🗳

                                                                                                                                                                                                                                        [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                        @jik@federate.social

                                                                                                                                                                                                                                        Is the above conversation legit or is it ?

                                                                                                                                                                                                                                        it's legit:0
                                                                                                                                                                                                                                        it's phishing:65

                                                                                                                                                                                                                                        Closed

                                                                                                                                                                                                                                          [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                          @jik@federate.social

                                                                                                                                                                                                                                          Is this private conversation legit, or has my contact's LinkedIn account been compromised? Vote in the poll in the reply!

                                                                                                                                                                                                                                          LinkedIn private messaging conversation:

HIM: Hi,Jonathan
I hope everything is going well with you!
I have a friend named [elided], and I’ve already given her a brief introduction about you. She is very eager to have the opportunity to connect with you.
If it’s convenient, please share your phone number with me, and I’ll pass it on to her.
Thank you very much!

ME: Hi [elided]. Thanks for reaching out. Can you be a bit more specific about why Kalina wants to connect?

HIM: She's building her network and making more friends
You can send me your cell phone number, and I'll have her text you

                                                                                                                                                                                                                                          Alt...LinkedIn private messaging conversation: HIM: Hi,Jonathan I hope everything is going well with you! I have a friend named [elided], and I’ve already given her a brief introduction about you. She is very eager to have the opportunity to connect with you. If it’s convenient, please share your phone number with me, and I’ll pass it on to her. Thank you very much! ME: Hi [elided]. Thanks for reaching out. Can you be a bit more specific about why Kalina wants to connect? HIM: She's building her network and making more friends You can send me your cell phone number, and I'll have her text you

                                                                                                                                                                                                                                            [?]Sylvhem » 🌐
                                                                                                                                                                                                                                            @Sylvhem@eldritch.cafe

                                                                                                                                                                                                                                            Regardez ce qu’on m’a offert :3.

                                                                                                                                                                                                                                            Un carnet à mots de passe sur la couverture duquel se trouve une gravure de méduse.

                                                                                                                                                                                                                                            Alt...Un carnet à mots de passe sur la couverture duquel se trouve une gravure de méduse.

                                                                                                                                                                                                                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                            @Steve12L@mamot.fr

                                                                                                                                                                                                                                            [?]gcve.eu » 🌐
                                                                                                                                                                                                                                            @gcve@social.circl.lu

                                                                                                                                                                                                                                            [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                            @jik@federate.social

                                                                                                                                                                                                                                            If you're requiring everybody at the company to do training so you can show your auditors that everybody did the training, then you're missing the point.
                                                                                                                                                                                                                                            The point of training is to equip people to do the right thing. If the training doesn't accomplish that, then making sure all the boxes are checked is worthless.
                                                                                                                                                                                                                                            What problem is the training trying to solve? Is the training necessary and sufficient to solve it? If you're not answering these questions, you're doing it wrong.

                                                                                                                                                                                                                                              Lien Rag boosted

                                                                                                                                                                                                                                              [?]LittleAlex 🇺🇦🇮🇱🇩🇪🇳🇴 » 🌐
                                                                                                                                                                                                                                              @littlealex@infosec.exchange

                                                                                                                                                                                                                                              Post-heist reports reveal the password for the Louvre's video surveillance was 'Louvre,' and suddenly the dumpster-tier opsec of videogame NPCs seems a lot less absurd

                                                                                                                                                                                                                                              pcgamer.com/software/security/

                                                                                                                                                                                                                                                Ian boosted

                                                                                                                                                                                                                                                [?]abadidea » 🌐
                                                                                                                                                                                                                                                @0xabad1dea@infosec.exchange

                                                                                                                                                                                                                                                Someone asked me to hand-translate a publicly posted Chinese technical report about NSA shenanigans on the Chinese Center for Time-Keeping network. It took me a while, because it turns out translating technical corporatese from your third language is very hard when chronically sleep deprived, but it is done.

                                                                                                                                                                                                                                                docs.google.com/document/d/1gk

                                                                                                                                                                                                                                                  AodeRelay boosted

                                                                                                                                                                                                                                                  [?]Christoffer S. » 🌐
                                                                                                                                                                                                                                                  @nopatience@swecyb.com

                                                                                                                                                                                                                                                  Quick question to the blue teamers out there:

                                                                                                                                                                                                                                                  What's your take on MITRE ATT&CK Tactics and Techniques? Do you find them useful? If yes, how and in what capacity do you use them? (To the extent that you can and want to share...)

                                                                                                                                                                                                                                                  If you could have tactics and techniques extracted from publicly available reports/articles, would that be useful? If yes, why?

                                                                                                                                                                                                                                                  (And imagine extracted not just by direct technique referencing, but also indirectly extracted through textual descriptions.)

                                                                                                                                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                                                                                                                                    Un fabricant arrête à distance un aspirateur connecté après la désactivation par son possesseur de la fonctionnalité de collecte des données,
                                                                                                                                                                                                                                                    L'ingénieur l'a réactivé à l'aide de scripts Python personnalisés

                                                                                                                                                                                                                                                    embarque.developpez.com/actu/3

                                                                                                                                                                                                                                                    Etonnant non ?
                                                                                                                                                                                                                                                    Ou pas...

                                                                                                                                                                                                                                                      AodeRelay boosted

                                                                                                                                                                                                                                                      [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                                                                                                                                                                                                                                                      @rysiek@mstdn.social

                                                                                                                                                                                                                                                      And this, kids, is why we never ever set up easy-to-guess passwords. Even in testing, even temporarily. Just pwgen it, every time.

                                                                                                                                                                                                                                                      unionesarda.it/en/world/louvre

                                                                                                                                                                                                                                                      > accessing the museum's video surveillance server required typing the all-too-obvious word: LOUVRE

                                                                                                                                                                                                                                                        [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                        @jik@federate.social

                                                                                                                                                                                                                                                        I got this banner at the website this evening.
                                                                                                                                                                                                                                                        The website is asking me to consent to share my "navigation and use activity" with third-party service providers without telling me who they are or exactly what data are shared with them.
                                                                                                                                                                                                                                                        These details also don't seem to be available in the website's privacy policy.
                                                                                                                                                                                                                                                        This is a shitty, useless consent banner which purports to be there to protect my privacy when in fact it's doing no such thing.

                                                                                                                                                                                                                                                        "We use trusted partners to improve your experience

We use third-party service providers to help us operate and manage this website. By clicking Continue, you agree to the collection by and disclosure to third parties of your navigation and use activity on this website.

We also use cookies and other tracking technologies to enhance your experience through analyzing our website performance and traffic. By continuing to use our website or mobile application, you understand our use of cookies as described on the Privacy page found at the bottom of this webpage. You can change your cookie settings by selecting Cookie preferences.

["Continue" button]"

                                                                                                                                                                                                                                                        Alt..."We use trusted partners to improve your experience We use third-party service providers to help us operate and manage this website. By clicking Continue, you agree to the collection by and disclosure to third parties of your navigation and use activity on this website. We also use cookies and other tracking technologies to enhance your experience through analyzing our website performance and traffic. By continuing to use our website or mobile application, you understand our use of cookies as described on the Privacy page found at the bottom of this webpage. You can change your cookie settings by selecting Cookie preferences. ["Continue" button]"

                                                                                                                                                                                                                                                          AodeRelay boosted

                                                                                                                                                                                                                                                          [?]Max Leibman » 🌐
                                                                                                                                                                                                                                                          @maxleibman@beige.party

                                                                                                                                                                                                                                                          The professionals who tell us that humans are the weakest link in infosec are, themselves, human, so they are the weakest link in infosec and should therefore not be trusted to tell us about the weakest link in infosec.

                                                                                                                                                                                                                                                            [?]*|FNAME|*:canada: » 🌐
                                                                                                                                                                                                                                                            @crispius@mstdn.fname.ca

                                                                                                                                                                                                                                                            Happy Halloween (+1)

                                                                                                                                                                                                                                                            😱😱😱

                                                                                                                                                                                                                                                            Text message thread from ’Mom’ 

Mom›
Kamloops BC
•-AM

I signed up for X now l
want to delete it as a
whole bunch of charges
are now on my mobile
phone, I thought it was
free, Wrong! So how do I
do this please.

Me:

You've likely been
scammed.

Just stop doing things
and l'Il be over in a bit.
Delivered

                                                                                                                                                                                                                                                            Alt...Text message thread from ’Mom’ Mom› Kamloops BC •-AM I signed up for X now l want to delete it as a whole bunch of charges are now on my mobile phone, I thought it was free, Wrong! So how do I do this please. Me: You've likely been scammed. Just stop doing things and l'Il be over in a bit. Delivered

                                                                                                                                                                                                                                                              [?]*|FNAME|*:canada: » 🌐
                                                                                                                                                                                                                                                              @crispius@mstdn.fname.ca

                                                                                                                                                                                                                                                              Crisis averted. She saw ‘Mobil’ (the gas station) on her credit card statement and panicked because she had just set up an X account, after being constantly badgered into it by her Google searches. 🙃

                                                                                                                                                                                                                                                                Rodolphe boosted

                                                                                                                                                                                                                                                                [?]Harry Sintonen » 🌐
                                                                                                                                                                                                                                                                @harrysintonen@infosec.exchange

                                                                                                                                                                                                                                                                Several months ago, I found a from - Authentication bypass for some passwords due to PHP type juggling (CVE-2025-47776).

                                                                                                                                                                                                                                                                Any account that has a password that results in a hash that matches ^0+[Ee][0-9]+$ can be logged in with a password that matches that regex as well. For example, password comito5 can be used to log in to the affected accounts and thus gain unauthorised access.

                                                                                                                                                                                                                                                                The root cause of this bug is the incorrect use of == to match the password hash:

                                                                                                                                                                                                                                                                if( auth_process_plain_password( $p_test_password, $t_password, $t_login_method ) == $t_password )

                                                                                                                                                                                                                                                                The fix is to use === for the comparison.

                                                                                                                                                                                                                                                                This vulnerability has existed in MantisBT ever since hashed password support was added (read: decades). MantisBT 2.27.2 and later include a fix to this vulnerability. mantisbt.org/download.php

                                                                                                                                                                                                                                                                Root cause of CVE-2025-47776 vulnerability: Use of == instead of === to compare password hashes.

                                                                                                                                                                                                                                                                Alt...Root cause of CVE-2025-47776 vulnerability: Use of == instead of === to compare password hashes.

                                                                                                                                                                                                                                                                  [?]mc.fly » 🌐
                                                                                                                                                                                                                                                                  @mcfly@milliways.social

                                                                                                                                                                                                                                                                  cybersecuritynews.com/phantomr

                                                                                                                                                                                                                                                                  and especially the libary repository is really becoming the PHP security problem of 2025.

                                                                                                                                                                                                                                                                  Another breach of libaries hosted on npm, this time 126 malicious npm packages that have collectively accumulated over 86000 downloads are affected

                                                                                                                                                                                                                                                                    [?]Paco Ho Ho Hope 🎄 » 🌐
                                                                                                                                                                                                                                                                    @paco@infosec.exchange

                                                                                                                                                                                                                                                                    Editing a draft of an internal policy spreadsheet. (I hate security-by-spreadsheet!)

                                                                                                                                                                                                                                                                    I am seriously on a campaign to stomp out the use of the word comprehensive. It virtually never adds anything. It's rarely true. We routinely forego being "comprehensive" in order to be "efficient."

                                                                                                                                                                                                                                                                    Like emdashes and 3-item bulleted lists, it's also a favourite output of LLMs.

                                                                                                                                                                                                                                                                    Screenshot showing Microsoft Excel's find and replace dialog. In the find box it says "comprehensive" and in the replace box it says nothing at all. There's a pop up that says "All done. We made 89 replacements." That is: we deleted 89 instances of the word comprehensive.

                                                                                                                                                                                                                                                                    Alt...Screenshot showing Microsoft Excel's find and replace dialog. In the find box it says "comprehensive" and in the replace box it says nothing at all. There's a pop up that says "All done. We made 89 replacements." That is: we deleted 89 instances of the word comprehensive.

                                                                                                                                                                                                                                                                      [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                      @jik@federate.social

                                                                                                                                                                                                                                                                      Looks like somebody broke into 's account and used it to send a bunch of phishing emails.
                                                                                                                                                                                                                                                                      No explanation given for how; perhaps @zackwhittaker can wheedle it out of them.
                                                                                                                                                                                                                                                                      Since it says here that they've "secured" the account, my guess is a bad password (or infostealer) + no . The most obvious explanation is usually the correct one.
                                                                                                                                                                                                                                                                      Though I suppose a cracked Lastpass vault is also a possibility.

                                                                                                                                                                                                                                                                      Email screenshot. From "Atari - Update <update@atari.com>". Subject "Official notice from Atari – Ignore recent phishing emails pretending to be us".  Atari logo. Text:

 Earlier this week, an unauthorized party gained limited, temporary access to our third-party email service provider and used it to send phishing emails. These emails were not sent by anyone from Atari.

We have already identified and resolved the issue, secured the account, and while our investigation is ongoing, upon initial review it appears that no personal information, customer data, or internal systems were accessed or compromised.

If you received a suspicious or unexpected email from Atari between October 21 and October 30, please delete or ignore it. We sincerely apologize for any confusion or inconvenience this may have caused.

Protecting our community’s trust and security is extremely important to us, and we are taking additional steps to further safeguard our systems going forward.

If you have any questions or concerns, please feel free to reach out to us at https://atari.com/pages/contact.

                                                                                                                                                                                                                                                                      Alt...Email screenshot. From "Atari - Update <update@atari.com>". Subject "Official notice from Atari – Ignore recent phishing emails pretending to be us". Atari logo. Text: Earlier this week, an unauthorized party gained limited, temporary access to our third-party email service provider and used it to send phishing emails. These emails were not sent by anyone from Atari. We have already identified and resolved the issue, secured the account, and while our investigation is ongoing, upon initial review it appears that no personal information, customer data, or internal systems were accessed or compromised. If you received a suspicious or unexpected email from Atari between October 21 and October 30, please delete or ignore it. We sincerely apologize for any confusion or inconvenience this may have caused. Protecting our community’s trust and security is extremely important to us, and we are taking additional steps to further safeguard our systems going forward. If you have any questions or concerns, please feel free to reach out to us at https://atari.com/pages/contact.

                                                                                                                                                                                                                                                                        [?]cR0w » 🌐
                                                                                                                                                                                                                                                                        @cR0w@infosec.exchange

                                                                                                                                                                                                                                                                        Who would win? A quarter-trillion dollar industry or these four horsemen?

                                                                                                                                                                                                                                                                        Bob's Burgers scene with four Equistricles; four men dressed up as Equistranauts. They are labeled "Default / Hardcoded Creds", "SQLi", "Running as root / admin / SYSTEM", and "../".

                                                                                                                                                                                                                                                                        Alt...Bob's Burgers scene with four Equistricles; four men dressed up as Equistranauts. They are labeled "Default / Hardcoded Creds", "SQLi", "Running as root / admin / SYSTEM", and "../".

                                                                                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                          New "Brash" Exploit Crashes Browsers Instantly with a Single Malicious URL

                                                                                                                                                                                                                                                                          thehackernews.com/2025/10/new-

                                                                                                                                                                                                                                                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                            @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                            @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                            mig5 boosted

                                                                                                                                                                                                                                                                            [?]jpoesen | 🇪🇺 | 🏳️‍🌈 » 🌐
                                                                                                                                                                                                                                                                            @jpoesen@social.jpoesen.com

                                                                                                                                                                                                                                                                            folks at CERN just released a new version of their cheatsheet for forensics investigations in :

                                                                                                                                                                                                                                                                            gitlab.cern.ch/ComputerSecurit

                                                                                                                                                                                                                                                                              [?]Neil Craig » 🌐
                                                                                                                                                                                                                                                                              @tdp_org@mastodon.social

                                                                                                                                                                                                                                                                              Yesterday I deployed a change on www.bbc.co.uk/.com, account.bbc.com, our main media mediation service etc. which soft-disabled TLS 1.0 & 1.1.

                                                                                                                                                                                                                                                                              Requests over TLS 1.0/1.1 on ^ result in an error page (inc link to a feedback form).

                                                                                                                                                                                                                                                                              So far I've uncovered a load of internet junk inc. a fleet of old TVs in Asia which poll our weather pages for their local forecast but nothing's been reported broken yet.

                                                                                                                                                                                                                                                                              Really wish the web had a deprecation strategy. This is a lot of work.

                                                                                                                                                                                                                                                                                [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                @jik@federate.social

                                                                                                                                                                                                                                                                                23 days later, I'm trying to download my monthly Discover statement, and I still have to override the user agent string in my browser and claim that I"m using an _older_ version of the browser than I'm actually using in order to get the website to let me log in.
                                                                                                                                                                                                                                                                                🤦

                                                                                                                                                                                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                  @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                  Tout va bien !

                                                                                                                                                                                                                                                                                  Les États-Unis sont désormais leaders mondiaux en matière d'investissement dans les logiciels de surveillance,
                                                                                                                                                                                                                                                                                  Tandis que les fonds publics européens affluent vers l'industrie des logiciels espions

                                                                                                                                                                                                                                                                                  securite.developpez.com/actu/3

                                                                                                                                                                                                                                                                                    AodeRelay boosted

                                                                                                                                                                                                                                                                                    [?]My camera shoots fascists » 🌐
                                                                                                                                                                                                                                                                                    @Mikal@sfba.social

                                                                                                                                                                                                                                                                                    Please for the love of fuck, do not under any circumstances give a surveillance app access to your address book/contacts. You are snitching out all of our personal information that we trusted you with.

                                                                                                                                                                                                                                                                                    Why am I reminded of this once again? Because I went on FB for one of the few groups that's only there and noticed the People You May Know had a suggestion for someone I went on two dates with a couple years ago. There is no other way they could've made that connection unless she granted access to their app.

                                                                                                                                                                                                                                                                                    I think from now on, I'm only going to give date matches my Signal username. If they don't or won't use Signal, we're probably not a match anyway. Or maybe I'll just get an anonymous virtual SIM for things like that.

                                                                                                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                      Qui aurait pu prédire ?

                                                                                                                                                                                                                                                                                      Les lunettes Ray-Ban Meta déjà transformées en outil d'espionnage

                                                                                                                                                                                                                                                                                      generation-nt.com/actualites/m

                                                                                                                                                                                                                                                                                        [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                        @jik@federate.social

                                                                                                                                                                                                                                                                                        I would like to believe that if the US federal government weren't completely fucked up right now then OpenAI and the other AI parasites with a nexus in the US would have been criminally charged by now with violating the by actively circumventing the crawling protections added recently to websites specifically to block them.
                                                                                                                                                                                                                                                                                        Alas, the government is too busy engaging in vindictive prosecution of 's enemies who aren't actively bribing him.

                                                                                                                                                                                                                                                                                        Ref: darmstadt.social/@claudius/115

                                                                                                                                                                                                                                                                                          BohwaZ boosted

                                                                                                                                                                                                                                                                                          [?]Phil M0OFX » 🌐
                                                                                                                                                                                                                                                                                          @philpem@digipres.club

                                                                                                                                                                                                                                                                                          What kind of person emails someone to say "I can put your static site in an IFRAME", declare it a security vulnerability, and when told "it's a personal website..." demand a bug bounty and a mention on the front page?

                                                                                                                                                                                                                                                                                          Edit - even better, the "description of vulnerability" is a bunch of stuff copy-pasted from the OWASP TOP10.

                                                                                                                                                                                                                                                                                            [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                            @jik@federate.social

                                                                                                                                                                                                                                                                                            Why websites shouldn't indiscriminately block VPN users

                                                                                                                                                                                                                                                                                            I convinced a state senator that government websites indiscriminately blocking VPN users is bad. Here's the case I made, which you can use yourself to keep fighting the good fight.

                                                                                                                                                                                                                                                                                            blog.kamens.us/2025/10/25/why-

                                                                                                                                                                                                                                                                                              0 ★ 2 ↺
                                                                                                                                                                                                                                                                                              mig5 boosted

                                                                                                                                                                                                                                                                                              [?]oldsysops » 🌐
                                                                                                                                                                                                                                                                                              @oldsysops@social.dk-libre.fr

                                                                                                                                                                                                                                                                                              hop je suis en congés donc c'est pile poil le moment pour aborder un sujet professionnel ! ( ne cherchez pas, c'est une logique imparable).

                                                                                                                                                                                                                                                                                              at $dayjob, on réfléchi a regarder éventuellement a se fzire certifier iso27001 (mais on a un peu peur de la norme).

                                                                                                                                                                                                                                                                                              du coup, ceci est une request for comment (oui, une rfc) sur la norme iso27001,

                                                                                                                                                                                                                                                                                              • est ce que c'est toujours d'actualité ou il y a des certifications plus récentes (et plus agile™).
                                                                                                                                                                                                                                                                                              • est ce qu' ebios c'est dans la norme ou j'y comprends rien et c'est autre chose ?
                                                                                                                                                                                                                                                                                              • avez vous déjà fait une certification de ce type (retour très apprécié)
                                                                                                                                                                                                                                                                                              • connaisez vous des organismes qui accompagne ce genre de certification ?
                                                                                                                                                                                                                                                                                              et je viens d'avoir un flash, au fosdem, un stand presentait justement un logiciel open-source pour gerer ce genre de choses (gestion de projet/ suivi sécurité)

                                                                                                                                                                                                                                                                                                Martouf boosted

                                                                                                                                                                                                                                                                                                [?]BeyondMachines :verified: » 🤖 🌐
                                                                                                                                                                                                                                                                                                @beyondmachines1@infosec.exchange

                                                                                                                                                                                                                                                                                                Microsoft releases emergency patches for actively exploited critical WSUS Deserialization flaw

                                                                                                                                                                                                                                                                                                Microsoft released emergency patches for CVE-2025-59287, a critical remote code execution vulnerability in Windows Server Update Services that has been actively exploited in the wild since October 24, 2025. The flaw was originally patched in October 2025 update, but the original patch proved insufficient. The flaw is potentially wormable across enterprise networks and affects all Windows Server versions with the WSUS Server Role enabled.

                                                                                                                                                                                                                                                                                                **If you have Windows servers with WSUS enabled, prioritize patching with the Microsoft's October 23, 2025 out-of-band security update for CVE-2025-59287 and reboot - this vulnerability is actively exploited in the wild. Even if you already installed October's regular patches, you must apply this emergency update since the initial fix was incomplete.**

                                                                                                                                                                                                                                                                                                beyondmachines.net/event_detai

                                                                                                                                                                                                                                                                                                  [?]Michael T Babcock » 🌐
                                                                                                                                                                                                                                                                                                  @mikebabcock@floss.social

                                                                                                                                                                                                                                                                                                  I'm going to put this out there to all the people who want to disagree: I still prefer a password plus USB-connected token to the system, and I wish websites would stop trying to push me to what is effectively a single point of failure.

                                                                                                                                                                                                                                                                                                    [?]BobDaHacker 🏳️‍⚧️ (39C3 ☎️ 24630) » 🌐
                                                                                                                                                                                                                                                                                                    @bobdahacker@infosec.exchange

                                                                                                                                                                                                                                                                                                    [?]BobDaHacker 🏳️‍⚧️ (39C3 ☎️ 24630) » 🌐
                                                                                                                                                                                                                                                                                                    @bobdahacker@infosec.exchange

                                                                                                                                                                                                                                                                                                    Apparently tons of people registered accounts on tons of platforms with i@hate.you

                                                                                                                                                                                                                                                                                                    Not knowing that .you would come to exist in 2025.

                                                                                                                                                                                                                                                                                                    Lmfao

                                                                                                                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                      Qui aurait pu prédire ?

                                                                                                                                                                                                                                                                                                      « Un cauchemar pour la vie privée » : est accusé de collecter des données sensibles

                                                                                                                                                                                                                                                                                                      01net.com/actualites/cauchemar

                                                                                                                                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                        Fritange boosted

                                                                                                                                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                        LordPhoenix boosted

                                                                                                                                                                                                                                                                                                        [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                        @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                        [?]Hans-Cees 🌳🌳🤢🦋🐈🐈🍋🍋🐝🐜 » 🌐
                                                                                                                                                                                                                                                                                                        @hanscees@ieji.de

                                                                                                                                                                                                                                                                                                        @GossiTheDog @campuscodi critics question why the basic flaws being exploited — buffer overflows, command injections, SQL injections — remain prevalent in mission-critical codebases maintained by companies whose core business is cybersecurity.
                                                                                                                                                                                                                                                                                                        Citrix NetScaler, Ivanti, Fortinet, Palo Alto Networks, Cisco, SonicWall, and Juniper.

                                                                                                                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                          131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
                                                                                                                                                                                                                                                                                                          thehackernews.com/2025/10/131-

                                                                                                                                                                                                                                                                                                            [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                            @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                            [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                                                                                                                                                            @brian_greenberg@infosec.exchange

                                                                                                                                                                                                                                                                                                            The DOJ just seized $15B from a “pig butchering” 🐷 scam so large it reads like fiction. But the worst part isn’t the money — it’s that much of it ran on forced labor. People are trafficked into compounds, running fake romances to scam others online. What’s striking is the scale: well-educated professionals lost life savings to criminals who themselves were victims. It’s a grim feedback loop of exploitation, loneliness, and tech-enabled deceit.

                                                                                                                                                                                                                                                                                                            ⚠️ $15B seized from crypto scam
                                                                                                                                                                                                                                                                                                            💔 Forced labor behind the fraud
                                                                                                                                                                                                                                                                                                            🔐 Victims on both sides of the screen
                                                                                                                                                                                                                                                                                                            🌍 FBI: “Human suffering” at global scale

                                                                                                                                                                                                                                                                                                            arstechnica.com/tech-policy/20

                                                                                                                                                                                                                                                                                                              CBO @ le17 boosted

                                                                                                                                                                                                                                                                                                              [?]sedje » 🌐
                                                                                                                                                                                                                                                                                                              @sedje@fosstodon.org

                                                                                                                                                                                                                                                                                                              ipgrep is a CLI tool that doesn't search by regex, but by IP-CIDR:

                                                                                                                                                                                                                                                                                                              github.com/ossobv/ipgrep

                                                                                                                                                                                                                                                                                                              It can come in handy when you're debugging route tables, firewalls, extracting IPs or networks from text files...

                                                                                                                                                                                                                                                                                                              Example:

                                                                                                                                                                                                                                                                                                              ```
                                                                                                                                                                                                                                                                                                              $ ipgrep -m within 127.0.1.0/24 /etc/hosts
                                                                                                                                                                                                                                                                                                              127.0.1.1 wortel.kiwi wortel
                                                                                                                                                                                                                                                                                                              ```

                                                                                                                                                                                                                                                                                                              Written in . My peers might appreciate it.

                                                                                                                                                                                                                                                                                                              The image shows a prompt of ipcalc piped to ipgrep. ipcalc outputs IP network information, in this case 192.168.32.0/19 among others. ipgrep searches for 192.168.43.21 and finds 192.168.32.0/19. The match is colorized, as with regular grep. And 1 line of context is shown above and below the match.

                                                                                                                                                                                                                                                                                                              Alt...The image shows a prompt of ipcalc piped to ipgrep. ipcalc outputs IP network information, in this case 192.168.32.0/19 among others. ipgrep searches for 192.168.43.21 and finds 192.168.32.0/19. The match is colorized, as with regular grep. And 1 line of context is shown above and below the match.

                                                                                                                                                                                                                                                                                                                [?]Jo - pièce de résistance » 🌐
                                                                                                                                                                                                                                                                                                                @JoBlakely@mastodon.social

                                                                                                                                                                                                                                                                                                                ***infosec specialists are needed in the resistance ***

                                                                                                                                                                                                                                                                                                                The world needs tech security specialists to run workshops at public libraries for all ages & abilities to remove spyware, AI, reduce surveillance, understand the issues, & for more advanced, move to Linux, degooglefy, etc.

                                                                                                                                                                                                                                                                                                                (Some) Libraries will pay for these workshops. There may be grants too.
                                                                                                                                                                                                                                                                                                                If you have these skills, please consider offering them.

                                                                                                                                                                                                                                                                                                                  [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                  @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                  Suivi réseau : comparer des scans avec l’outil
                                                                                                                                                                                                                                                                                                                  it-connect.fr/ndiff-comparer-d

                                                                                                                                                                                                                                                                                                                    [?]mhoye » 🌐
                                                                                                                                                                                                                                                                                                                    @mhoye@mastodon.social

                                                                                                                                                                                                                                                                                                                    If you use F5 anything, run, do not walk: my.f5.com/manage/s/article/K00

                                                                                                                                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                      F5 piratée (et pas qu’un peu) par un État-nation : des mises à jour à installer d’urgence !
                                                                                                                                                                                                                                                                                                                      next.ink/204777/f5-piratee-et-

                                                                                                                                                                                                                                                                                                                        AodeRelay boosted

                                                                                                                                                                                                                                                                                                                        [?]ℒӱḏɩę 💾☮∞🎶♲☀🔋 » 🌐
                                                                                                                                                                                                                                                                                                                        @Lydie@tech.lgbt

                                                                                                                                                                                                                                                                                                                        This is a meme about old-school computer security.

The top of the image features text that reads, "IT security in 1990s". Below this text is a photo of a beige and clear plastic storage box filled with 3.5-inch floppy disks. The box has a small lock on the front with a key in it, which is highlighted by a red circle.

The bottom half of the image is a screenshot of a tweet from a user named Bear (@BearJFK). The tweet says, "Laugh all you want, but the information on those floppies can't be hacked from half a world away."

The joke contrasts the simple, physical security of the past with the modern threat of remote digital hacking.

                                                                                                                                                                                                                                                                                                                        Alt...This is a meme about old-school computer security. The top of the image features text that reads, "IT security in 1990s". Below this text is a photo of a beige and clear plastic storage box filled with 3.5-inch floppy disks. The box has a small lock on the front with a key in it, which is highlighted by a red circle. The bottom half of the image is a screenshot of a tweet from a user named Bear (@BearJFK). The tweet says, "Laugh all you want, but the information on those floppies can't be hacked from half a world away." The joke contrasts the simple, physical security of the past with the modern threat of remote digital hacking.

                                                                                                                                                                                                                                                                                                                          [?]Dash Remover » 🤖 🌐
                                                                                                                                                                                                                                                                                                                          @dashremover@mastodon.social

                                                                                                                                                                                                                                                                                                                          imagine explaining to a future historian that the collapse of US national security began because someone couldn’t resist illegally storing 187,000 AI-generated robot nudes on a DOE server.

                                                                                                                                                                                                                                                                                                                          not espionage. not sabotage. just vibes 💀

                                                                                                                                                                                                                                                                                                                            [?]mig5 » 🌐
                                                                                                                                                                                                                                                                                                                            @mig5@goto.mig5.net

                                                                                                                                                                                                                                                                                                                            I knew that HTTPS Everywhere was basically obsolete due to browsers adopting that setting natively.

                                                                                                                                                                                                                                                                                                                            What I didn’t know was that the original domain that shipped HTTPS Everywhere rulesets, had been:

                                                                                                                                                                                                                                                                                                                            • abandoned by the maintainers,
                                                                                                                                                                                                                                                                                                                            • since obtained by someone else
                                                                                                                                                                                                                                                                                                                            • made to redirect to a known malware site

                                                                                                                                                                                                                                                                                                                            https://lists.debian.org/debian-lts-announce/2025/10/msg00011.html

                                                                                                                                                                                                                                                                                                                            #HTTPSEverywhere
                                                                                                                                                                                                                                                                                                                            #MalwareEverywhere
                                                                                                                                                                                                                                                                                                                            #Infosec

                                                                                                                                                                                                                                                                                                                              [?]Laurent Cheylus » 🌐
                                                                                                                                                                                                                                                                                                                              @lcheylus@bsd.network

                                                                                                                                                                                                                                                                                                                              Pixnapping: a new Class of Attacks that allows a malicious Android App to stealthily leak Information displayed by other Android Apps or arbitrary Websites. Sucessfull demos on Google and Samsung phones pixnapping.com/

                                                                                                                                                                                                                                                                                                                              Android logo and banner

                                                                                                                                                                                                                                                                                                                              Alt...Android logo and banner

                                                                                                                                                                                                                                                                                                                                [?]AA » 🌐
                                                                                                                                                                                                                                                                                                                                @AAKL@infosec.exchange

                                                                                                                                                                                                                                                                                                                                Why am I not surprised? If you missed this:

                                                                                                                                                                                                                                                                                                                                "Researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted."

                                                                                                                                                                                                                                                                                                                                Wired: Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data wired.com/story/satellites-are @WIRED @agreenberg @mattburgess

                                                                                                                                                                                                                                                                                                                                  [?]Laurent Cheylus » 🌐
                                                                                                                                                                                                                                                                                                                                  @lcheylus@bsd.network

                                                                                                                                                                                                                                                                                                                                  2 ans après sa découverte, la campagne de Cyberspionnage par clés USB infectées (potentiellement distribuées lors de salons professionnels) menée par le groupe de Hackers chinois Mustang Panda continue de hanter l'industrie maritime clubic.com/actualite-582661-le

                                                                                                                                                                                                                                                                                                                                    [?]Michael Downey 🧢 » 🌐
                                                                                                                                                                                                                                                                                                                                    @downey@floss.social

                                                                                                                                                                                                                                                                                                                                    Most of you reading this probably won't be surprised by this, but it's worth spreading the word (along with recommendations to mitigate risks) ....

                                                                                                                                                                                                                                                                                                                                    🗨️ "Law enforcement officials may have deployed a secretive cellphone surveillance technology last weekend at Portland’s Immigration and Customs Enforcement (ICE) facility."

                                                                                                                                                                                                                                                                                                                                    san.com/cc/exclusive-fake-cell

                                                                                                                                                                                                                                                                                                                                      [?]Timo Tijhof » 🌐
                                                                                                                                                                                                                                                                                                                                      @krinkle@fosstodon.org

                                                                                                                                                                                                                                                                                                                                      GitHub continues war against own users.

                                                                                                                                                                                                                                                                                                                                      Next: Remove support for standard 2FA/TOPT protocol, and introduce weekly expiry for <s>passwords</s> API tokens.

                                                                                                                                                                                                                                                                                                                                      github.com/orgs/community/disc

                                                                                                                                                                                                                                                                                                                                      github.com/orgs/community/disc

                                                                                                                                                                                                                                                                                                                                      Context:
                                                                                                                                                                                                                                                                                                                                      github.blog/security/supply-ch

                                                                                                                                                                                                                                                                                                                                        Taggart boosted

                                                                                                                                                                                                                                                                                                                                        [?]AA » 🌐
                                                                                                                                                                                                                                                                                                                                        @AAKL@infosec.exchange

                                                                                                                                                                                                                                                                                                                                        Nuts.

                                                                                                                                                                                                                                                                                                                                        "Nearly one in five high schoolers in the US — 19 percent — say that they or a friend have used AI to have a romantic relationship,"

                                                                                                                                                                                                                                                                                                                                        "Over a third of the teenagers said it was easier to talk to AI than to their parents. Those parents, by contrast, feel left in the dark: two thirds of them said that they have no idea how their kids are using AI."

                                                                                                                                                                                                                                                                                                                                        Futurism: Research: An Astonishing Proportion of High Schoolers Have Had a “Romantic Relationship” With an AI futurism.com/artificial-intell @Futurism

                                                                                                                                                                                                                                                                                                                                        Center for Democracy and Technology survey, from October 8: Hand in Hand: Schools’ Embrace of AI Connected to Increased Risks to Students cdt.org/insights/hand-in-hand-

                                                                                                                                                                                                                                                                                                                                        @mttaggart

                                                                                                                                                                                                                                                                                                                                          [?]Taggart » 🌐
                                                                                                                                                                                                                                                                                                                                          @mttaggart@infosec.exchange

                                                                                                                                                                                                                                                                                                                                          I don't know if this is explicitly a problem per se, but it is wild how useless the , , and hashtags have become. All I see is the most insipid LinkedIn-level clickbait. It's a shame that one of our best discovery methods in Fedi has been coopted by engagement farmers.

                                                                                                                                                                                                                                                                                                                                            [?]Alexandre Dulaunoy » 🌐
                                                                                                                                                                                                                                                                                                                                            @adulau@infosec.exchange

                                                                                                                                                                                                                                                                                                                                            Understanding the Efficacy of Phishing Training in Practice

                                                                                                                                                                                                                                                                                                                                            "Combined with the bulk of empirical evidence from other studies involving
                                                                                                                                                                                                                                                                                                                                            real-world, controlled experiments, our results suggests that organizations should not expect large anti-phishing benefits from either annual security awareness training or embedded phishing as commonly deployed today."

                                                                                                                                                                                                                                                                                                                                            In addition, the overall cost on third-party organisations doing incident response should not exclude the impact of false-positive reports, pre-notifications of phishing campaigns, or even worse, attackers abusing such awareness campaigns.

                                                                                                                                                                                                                                                                                                                                            🔗 people.cs.uchicago.edu/~granth

                                                                                                                                                                                                                                                                                                                                              [?]Alexandre Dulaunoy » 🌐
                                                                                                                                                                                                                                                                                                                                              @adulau@infosec.exchange

                                                                                                                                                                                                                                                                                                                                              RE: infosec.exchange/@UYBHYS/11534

                                                                                                                                                                                                                                                                                                                                              Glad to present at with @cedric our work on GCVE and Vulnerability Lookup, facilitating vulnerability management and publishing through a fully open-source stack.

                                                                                                                                                                                                                                                                                                                                              🔗 Online version vulnerability.circl.lu/
                                                                                                                                                                                                                                                                                                                                              🔗 github.com/vulnerability-lookup
                                                                                                                                                                                                                                                                                                                                              🔗 gcve.eu/

                                                                                                                                                                                                                                                                                                                                              @gcve @circl

                                                                                                                                                                                                                                                                                                                                              [?]Unlock Your Brain » 🌐
                                                                                                                                                                                                                                                                                                                                              @UYBHYS@infosec.exchange

                                                                                                                                                                                                                                                                                                                                              [Samedi 8/11 11h15] TALK de Cédric Bonhomme (@cedric) et Alexandre Dulaunoy (@adulau) du @circl :

                                                                                                                                                                                                                                                                                                                                              Advancing Vulnerability Tracking and Disclosure Through an open and distributed platform

                                                                                                                                                                                                                                                                                                                                              unlockyourbrain.bzh/conferences

                                                                                                                                                                                                                                                                                                                                              Bannière UYBHYS avec les photos des intervenants, le titre du talk et les sponsors de la conférence

                                                                                                                                                                                                                                                                                                                                              Alt...Bannière UYBHYS avec les photos des intervenants, le titre du talk et les sponsors de la conférence

                                                                                                                                                                                                                                                                                                                                                  AodeRelay boosted

                                                                                                                                                                                                                                                                                                                                                  [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                  @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                  In the hope that this might reach someone who might some day be in a position to decide whether to allow traffic to their app…
                                                                                                                                                                                                                                                                                                                                                  Please understand that this does not just impact your app.
                                                                                                                                                                                                                                                                                                                                                  Most devices run background apps that use the network frequently, including privacy-critical apps like Signal.
                                                                                                                                                                                                                                                                                                                                                  When you make someone turn off their VPN to use your app, the background traffic for all those _other_ apps also stops using the VPN.
                                                                                                                                                                                                                                                                                                                                                  Don't be an asshole. Stop blocking VPN traffic.

                                                                                                                                                                                                                                                                                                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                    @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                    I wish companies would involve people who actually understand the fundamentals of and design when building functionality like this, instead of just letting loose clueless engineers who look at the problem, say to themselves, "Six digits good. Ten letters BETTER!" and build stupid shit.

                                                                                                                                                                                                                                                                                                                                                      [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                      @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                      When you log into , it emails a security code you need to enter.
                                                                                                                                                                                                                                                                                                                                                      Here's a recent code I was sent: FPTQS-MPJJG
                                                                                                                                                                                                                                                                                                                                                      This is dumb.
                                                                                                                                                                                                                                                                                                                                                      6-digit codes are the gold standard for two critical reasons: (1) the range of a million possible codes is more than enough for adequate security; (2) most people can briefly memorize a 6-digit code almost instantaneously for long enough to enter it into another app.
                                                                                                                                                                                                                                                                                                                                                      10-letter codes are harder to use and add no appreciable security.

                                                                                                                                                                                                                                                                                                                                                        [?]BeyondMachines :verified: » 🤖 🌐
                                                                                                                                                                                                                                                                                                                                                        @beyondmachines1@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                        Electronics giant Avnet reports data breach affecting EMEA operations

                                                                                                                                                                                                                                                                                                                                                        Electronics distributor Avnet confirmd a data breach involving externally hosted cloud storage where threat actors stole approximately 1.3TB of compressed data (7-12TB raw) containing PII and operational details. The company claims the data isn't easily readable without proprietary tools but that's contradicted by threat actors publishing plaintext samples on dark web leak sites.

                                                                                                                                                                                                                                                                                                                                                        ****

                                                                                                                                                                                                                                                                                                                                                        beyondmachines.net/event_detai

                                                                                                                                                                                                                                                                                                                                                          [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                          @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                          Les autorités des USA en charge de l'immigration envisagent de créer une équipe de surveillance des réseaux sociaux,
                                                                                                                                                                                                                                                                                                                                                          Une initiative similaire au projet de surveillance de masse dénommé ChatControl en UE
                                                                                                                                                                                                                                                                                                                                                          securite.developpez.com/actu/3

                                                                                                                                                                                                                                                                                                                                                            [?]knoppix » 🌐
                                                                                                                                                                                                                                                                                                                                                            @knoppix95@mastodon.social

                                                                                                                                                                                                                                                                                                                                                            🆕 openSUSE Leap 16 is out, featuring major upgrades:
                                                                                                                                                                                                                                                                                                                                                            – Built on SUSE Linux Enterprise 16 for seamless migration & enterprise-level QA 🔧
                                                                                                                                                                                                                                                                                                                                                            – 24 months free support, with updates planned till 2032 🛡️
                                                                                                                                                                                                                                                                                                                                                            – New web-based Agama installer supports remote setups 🌐
                                                                                                                                                                                                                                                                                                                                                            – SELinux now default for stronger security 🔒
                                                                                                                                                                                                                                                                                                                                                            – Wayland-first, 64-bit only, Y2038-ready 💻

                                                                                                                                                                                                                                                                                                                                                            🔗 news.itsfoss.com/opensuse-leap

                                                                                                                                                                                                                                                                                                                                                              [?]ティージェーグレェ » 🌐
                                                                                                                                                                                                                                                                                                                                                              @teajaygrey@snac.bsd.cafe

                                                                                                                                                                                                                                                                                                                                                              I submitted a Pull Request to update MacPorts' OpenSSH to 10.1p1 here:

                                                                                                                                                                                                                                                                                                                                                              https://github.com/macports/macports-ports/pull/28592

                                                                                                                                                                                                                                                                                                                                                              GitHub Continuous Integration checks passed OK!

                                                                                                                                                                                                                                                                                                                                                              Alas, the agent.patch that iamGavinJ had created, doesn't apply cleanly, in large part because ssh-agent.c has been reworked significantly with this release.

                                                                                                                                                                                                                                                                                                                                                              Subsequently, I closed this previous Pull Request: https://github.com/macports/macports-ports/pull/28592 not because I didn't want to restore that functionality to launchd, but because it will require more effort than I can give such things at this time.

                                                                                                                                                                                                                                                                                                                                                              But, check out these improvements to ssh-agent from the OpenSSH 10.1 release notes:

                                                                                                                                                                                                                                                                                                                                                              "ssh-agent(1)](https://man.openbsd.org/ssh-agent.1), sshd(8): move agent listener sockets from /tmp to
                                                                                                                                                                                                                                                                                                                                                              under ~/.ssh/agent for both ssh-agent(1) and forwarded sockets
                                                                                                                                                                                                                                                                                                                                                              in sshd(8).

                                                                                                                                                                                                                                                                                                                                                              This ensures processes that have restricted filesystem access
                                                                                                                                                                                                                                                                                                                                                              that includes /tmp do not ambiently have the ability to use keys
                                                                                                                                                                                                                                                                                                                                                              in an agent.

                                                                                                                                                                                                                                                                                                                                                              Moving the default directory has the consequence that the OS will
                                                                                                                                                                                                                                                                                                                                                              no longer clean up stale agent sockets, so ssh-agent now gains
                                                                                                                                                                                                                                                                                                                                                              this ability.

                                                                                                                                                                                                                                                                                                                                                              To support $HOME on NFS, the socket path includes a truncated
                                                                                                                                                                                                                                                                                                                                                              hash of the hostname. ssh-agent will, by default, only clean up
                                                                                                                                                                                                                                                                                                                                                              sockets from the same hostname.

                                                                                                                                                                                                                                                                                                                                                              ssh-agent(1) gains some new flags: -U suppresses the automatic
                                                                                                                                                                                                                                                                                                                                                              cleanup of stale sockets when it starts. -u forces a cleanup
                                                                                                                                                                                                                                                                                                                                                              without keeping a running agent, -uu forces a cleanup that ignores
                                                                                                                                                                                                                                                                                                                                                              the hostname. -T makes ssh-agent put the socket back in /tmp."

                                                                                                                                                                                                                                                                                                                                                              Anyway, I updated this as well:

                                                                                                                                                                                                                                                                                                                                                              https://trac.macports.org/ticket/72482

                                                                                                                                                                                                                                                                                                                                                              I should probably actually close this ticket now that I think of it (fingers crossed that adding that to the PR is sufficient, since I forgot to add that note to the commit message as is typically preferred: https://trac.macports.org/ticket/73084).


                                                                                                                                                                                                                                                                                                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                Taggart boosted

                                                                                                                                                                                                                                                                                                                                                                [?]Harry Sintonen » 🌐
                                                                                                                                                                                                                                                                                                                                                                @harrysintonen@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                Broadcom has stopped delivering automated updates to Fusion and Workstation. All updates have to be downloaded and installed manually from the Broadcom Support Portal (as a side note: This portal is one of the worst corporate "support" websites I've seen in the last decade).

                                                                                                                                                                                                                                                                                                                                                                This is terrible. It will lead to tens of thousands of VMware installations remaining vulnerable to trivially exploitable flaws, for example, local privilege escalation via CVE-2025-41244 support.broadcom.com/web/ecx/s

                                                                                                                                                                                                                                                                                                                                                                BTW, Please note that to fix CVE-2025-41244 you must now manually download the correct VMware Tools package from the support portal, unpack the zip, mount the ISO image, and then execute the setup.exe from the mounted ISO image. There is currently no VMware releases that include the fixed VMware Tools, so if you create any new VMs you MUST install the update manually to each new VM. Did I already mention this is terrible?

                                                                                                                                                                                                                                                                                                                                                                VMWare Tools vulnerable to CVE-2025-41244 installed.

                                                                                                                                                                                                                                                                                                                                                                Alt...VMWare Tools vulnerable to CVE-2025-41244 installed.

                                                                                                                                                                                                                                                                                                                                                                  Timo Tijhof boosted

                                                                                                                                                                                                                                                                                                                                                                  [?]Neil Craig » 🌐
                                                                                                                                                                                                                                                                                                                                                                  @tdp_org@mastodon.social

                                                                                                                                                                                                                                                                                                                                                                  We're seeing requests to www.bbc.com return to normal-looking levels from Afghanistan - since about midday UTC today (1st Oct 2025).

                                                                                                                                                                                                                                                                                                                                                                  Graph of average (mean) requests per second to www.bbc.com from Afghanistan which goes from essentially zero all day today (beginning at midnight) to a regular-ish looking number of requests per second from about midday (UTC)

                                                                                                                                                                                                                                                                                                                                                                  Alt...Graph of average (mean) requests per second to www.bbc.com from Afghanistan which goes from essentially zero all day today (beginning at midnight) to a regular-ish looking number of requests per second from about midday (UTC)

                                                                                                                                                                                                                                                                                                                                                                    [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                    @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                    I find it mind-boggling that any sales rep at any company would think that an unsolicited connection request like this would accomplish anything other than to seem creepy and repel the recipient.
                                                                                                                                                                                                                                                                                                                                                                    I mean, I reject connection requests from sales reps in general, but "I tried to call but was unable to reach you"? Seriously? This is just gross.
                                                                                                                                                                                                                                                                                                                                                                    I don't want your calls. I don't want to connect with you on LinkedIn. Just leave me the fuck alone.

                                                                                                                                                                                                                                                                                                                                                                    Screenshot of LinkedIn connection request from "Nathan Taylor", "Security Representative, ThreatSpike". It reads as follows:
"I tried to call but was unable to reach you. I was curious as to how often you run penetration tests?
Here at ThreatSpike we offer a fixed-price, subscription-based Pen Testing & Red Teaming service. It’s unlimited, human-led (not automated), and eliminates the need for lengthy scoping calls."

                                                                                                                                                                                                                                                                                                                                                                    Alt...Screenshot of LinkedIn connection request from "Nathan Taylor", "Security Representative, ThreatSpike". It reads as follows: "I tried to call but was unable to reach you. I was curious as to how often you run penetration tests? Here at ThreatSpike we offer a fixed-price, subscription-based Pen Testing & Red Teaming service. It’s unlimited, human-led (not automated), and eliminates the need for lengthy scoping calls."

                                                                                                                                                                                                                                                                                                                                                                      [?]Brian Anderson (He/Him) » 🌐
                                                                                                                                                                                                                                                                                                                                                                      @btanderson@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                      New term: “camera snitch” (noun): that one person in a routine Teams meeting that turns the camera on, passive-aggressively forcing everyone else to turn their cameras on (to avoid looking suspicious).


                                                                                                                                                                                                                                                                                                                                                                        [?]Neil Craig » 🌐
                                                                                                                                                                                                                                                                                                                                                                        @tdp_org@mastodon.social

                                                                                                                                                                                                                                                                                                                                                                        Pleasantly surprised to find out that our commercial web CDN partner for www.bbc.com & www.bbc.co.uk has enabled Post-Quantum Crypto.

                                                                                                                                                                                                                                                                                                                                                                        So if you're using a modern web browser (Chromium & Firefox both support it) & are outside the UK, you'll automatically be using a quantum computer-resistant TLS key exchange mechanism (ML-KEM AKA Kyber) and (as far as we know) your traffic cannot be intercepted, stored & latterly decrypted when viable quantum computers come along.

                                                                                                                                                                                                                                                                                                                                                                          [?]DansLeRuSH ᴱᶰ » 🌐
                                                                                                                                                                                                                                                                                                                                                                          @danslerush@floss.social

                                                                                                                                                                                                                                                                                                                                                                          « Recently, security researcher Dirk-Jan Mollema disclosed CVE-2025–55241, a vulnerability so catastrophic that it reads like fiction : a single token, obtained from any test tenant, could have granted complete administrative control over every Microsoft Entra ID (Azure AD) tenant in the world. Every. Single. One. »

                                                                                                                                                                                                                                                                                                                                                                          tide.org/blog/god-mode-vulnera

                                                                                                                                                                                                                                                                                                                                                                            [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                            @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                            How to stop Google from invading your privacy and others' when you share links

                                                                                                                                                                                                                                                                                                                                                                            "share.google" links are evil. Here's how to get Google to stop spitting them at you.

                                                                                                                                                                                                                                                                                                                                                                            blog.kamens.us/2025/09/30/how-

                                                                                                                                                                                                                                                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                              EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
                                                                                                                                                                                                                                                                                                                                                                              thehackernews.com/2025/09/evil

                                                                                                                                                                                                                                                                                                                                                                                AodeRelay boosted

                                                                                                                                                                                                                                                                                                                                                                                [?]S.T. Veje » 🌐
                                                                                                                                                                                                                                                                                                                                                                                @stveje@mstdn.social

                                                                                                                                                                                                                                                                                                                                                                                I’m worried my PC (running NixOS) might be infected.

                                                                                                                                                                                                                                                                                                                                                                                I was looking at System Monitor & was surprised to see GPU at nearly constant 100% which it normally isn’t. What’s more, this activity seems to disappear once I start poking around and looking at running processes.

                                                                                                                                                                                                                                                                                                                                                                                I’m guessing some kind of cryptominer which is clever enough to try to hide its activity.

                                                                                                                                                                                                                                                                                                                                                                                Any advice what to do/what it might be? Unfortunately I have no idea how long it’s been going on.

                                                                                                                                                                                                                                                                                                                                                                                  [?]J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF: » 🌐
                                                                                                                                                                                                                                                                                                                                                                                  @jrdepriest@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                  Should I call myself a dev if I've only been writing in interpreted languages for 40+ years, i. e. "scripting"? I haven't compiled code since college in the 90s, but I've written so much BASIC, Pascal, Perl, SQL, and PowerShell before moving into stuff like Alteryx and other janky "No Code" solutions where you still end up writing Python or JavaScript if you want to be efficient. Not to mention one off solutions in things like AutoHotKey,BAT files, REXX, bash, and freakin' KiXtart.

                                                                                                                                                                                                                                                                                                                                                                                  I think in loops, subroutines, and if ... then ... else statements. I'm teaching myself jq and JSONPath because automation with REST APIs is easier when you know it.

                                                                                                                                                                                                                                                                                                                                                                                  I have never had a job where I am called a "developer". I've never had a job where writing code was an official part of my duties.

                                                                                                                                                                                                                                                                                                                                                                                  But every IT job I've ever had is made easier—made better—when I am allowed to use and build solutions using coding techniques and interpreters.

                                                                                                                                                                                                                                                                                                                                                                                  And I did it without genAI, just Google, O'Reilly books, and patient coworkers.

                                                                                                                                                                                                                                                                                                                                                                                    [?]Paco Ho Ho Hope 🎄 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                    @paco@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                    The witch’s robes flapped in the gale as she knelt on the beach. Waves crashed and she squinted as the sea spray lashed her face.

                                                                                                                                                                                                                                                                                                                                                                                    She withdrew a small syringe from the water as the magic started to work. As she stood, the wind calmed to a gentle breeze. The ocean settled until it was smooth as glass.

                                                                                                                                                                                                                                                                                                                                                                                    “This spell,” she said, knocking sand off her knees, “I call ‘sea quell injection’”

                                                                                                                                                                                                                                                                                                                                                                                      [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                      @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                                      Another credit reporting agency breach, another terrible breach notification letter

                                                                                                                                                                                                                                                                                                                                                                                      TransUnion is bad at security and bad at handling security breaches and none of this is going to get better until we have a real federal data privacy law with meaningful penalties for companies which leak people's data.

                                                                                                                                                                                                                                                                                                                                                                                      blog.kamens.us/2025/09/25/anot

                                                                                                                                                                                                                                                                                                                                                                                        BrianKrebs boosted

                                                                                                                                                                                                                                                                                                                                                                                        [?]Lesley Carhart :unverified: » 🌐
                                                                                                                                                                                                                                                                                                                                                                                        @hacks4pancakes@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                        I wrote an article about what I wish juniors in cybersecurity would ask for and contribute when asking for a mentor and career guidance, in light of the terrible tech jobs market.

                                                                                                                                                                                                                                                                                                                                                                                        tisiphone.net/2025/09/24/reaso

                                                                                                                                                                                                                                                                                                                                                                                          [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                                                                                                                                                                                                                                          @brian_greenberg@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                          So the Secret Service just rolled up a massive SIM farm in NYC, and it looks like a nation-state operation. We're not talking about some small time fraud, but an infrastructure play with 100,000 SIM cards, apparently capable of taking down the city's cellular grid. This feels less like simple espionage and more like preparation for some kind of offensive cyber or information warfare campaign. The fact that it was discovered during an investigation into threats against officials makes you wonder what the primary mission really was.
                                                                                                                                                                                                                                                                                                                                                                                          TL;DR
                                                                                                                                                                                                                                                                                                                                                                                          ⚠️ A massive SIM farm with 100,000 cards was seized in New York City.
                                                                                                                                                                                                                                                                                                                                                                                          🕵️ The operation is believed to be the work of a nation-state actor.
                                                                                                                                                                                                                                                                                                                                                                                          💥 The setup was powerful enough to potentially disable cell towers and launch denial of service attacks.
                                                                                                                                                                                                                                                                                                                                                                                          🤔 The ultimate goal is still unclear, but it points toward offensive capabilities, not just simple fraud. 
                                                                                                                                                                                                                                                                                                                                                                                          arstechnica.com/security/2025/

                                                                                                                                                                                                                                                                                                                                                                                            taziden boosted

                                                                                                                                                                                                                                                                                                                                                                                            [?]αxel simon ↙︎↙︎↙︎ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                            @axx@mstdn.fr

                                                                                                                                                                                                                                                                                                                                                                                            nerds, what would be genuine good reasons to use over something simpler like ?

                                                                                                                                                                                                                                                                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                                              [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                              @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                                              Quand un simple mot de passe faible suffit à briser Active Directory : de RC4 aux comptes de service mal protégés, comment un grand groupe hospitalier a été plongé dans le chaos
                                                                                                                                                                                                                                                                                                                                                                                              securite.developpez.com/actu/3

                                                                                                                                                                                                                                                                                                                                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                                                As developer verification gets ready to go, here's a new reason to be worried
                                                                                                                                                                                                                                                                                                                                                                                                androidauthority.com/android-s

                                                                                                                                                                                                                                                                                                                                                                                                  [?]Sheldon » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                  @sysop408@sfba.social

                                                                                                                                                                                                                                                                                                                                                                                                  Is anyone else getting a huge number of bot visits from servers in the Fastly network? I'm seeing junk traffic that approaches low level dDOS numbers and a huge chunk of it is coming from Fastly data centers.

                                                                                                                                                                                                                                                                                                                                                                                                    [?]Simon Zerafa (Status: 🙂🤧🖥️🪛{🌷🙂‍↔️}) » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                    @simonzerafa@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                    Just went to check on the latest Google Chrome CVE and see if I need to update or mitigate.

                                                                                                                                                                                                                                                                                                                                                                                                    I see that this PC doesn't even have Google Chrome installed. I remember electing not to install it when this OS was rebuilt a while ago.

                                                                                                                                                                                                                                                                                                                                                                                                    Clearly, I've not needed WebUSB or anything else that only the Chromium engine supports, so far.

                                                                                                                                                                                                                                                                                                                                                                                                    The best form of protection is not to install what isn't actually needed.

                                                                                                                                                                                                                                                                                                                                                                                                    How many apps, modules, libraries or frameworks or other code are you installing, just in case it might be needed?

                                                                                                                                                                                                                                                                                                                                                                                                      Marcos Dione boosted

                                                                                                                                                                                                                                                                                                                                                                                                      [?]abadidea » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                      @0xabad1dea@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                      To be frank, I’ve become extremely frustrated since the acquisition because now the environment combines the worst aspects of a make-it-up-as-you-go small company with the worst aspects of a faceless corporate overlord. I love my coworkers, I don’t love the general approach to projects and customers.

                                                                                                                                                                                                                                                                                                                                                                                                      I live in the Netherlands, I have a skilled worker visa as well as a Dutch marriage, I’m transitioning to citizenship in a year. I need a primarily WFH job but I can hybrid in Amsterdam. I have broad general infosec skills, with the most experience in C source code review but I am familiar with reverse engineering and interested in threat intel. I can provide unlimited access to Mastodon’s most popular dog for morale.

                                                                                                                                                                                                                                                                                                                                                                                                        [?]Wulfy—Speaker to the machines » 🔓
                                                                                                                                                                                                                                                                                                                                                                                                        @n_dimension@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                        @paco

                                                                                                                                                                                                                                                                                                                                                                                                        systems can never be secure and safe.
                                                                                                                                                                                                                                                                                                                                                                                                        And I say that as an AI moderate and person.

                                                                                                                                                                                                                                                                                                                                                                                                          Taggart boosted

                                                                                                                                                                                                                                                                                                                                                                                                          [?]Brian Anderson (He/Him) » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                          @btanderson@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                          An interesting perspective change:

                                                                                                                                                                                                                                                                                                                                                                                                          In a recent Tabletop exercise, one of the injects was a personal, physical threat sent to an infosec team member. It wasn’t the central theme of the scenario, but it probably had the most impact on me personally.

                                                                                                                                                                                                                                                                                                                                                                                                          We never really consider personal and family risk in our corporate, off-white collar jobs. We are certainly aware of the physical and mental toll that the job has on us, and we some of us live in perpetual fear of getting fired as a result of a breach, but “we know where you live?” “We’re coming for your wife\partner\kids”-type threats?. Where are those in your risk register?

                                                                                                                                                                                                                                                                                                                                                                                                          It doesn’t really matter if the threat actor can carry out those threats or not. Never mind that Your org probably doesn’t have a plan to deal with that so you’re kind of on your own to figure out what to do about it. Unless you’re in law enforcement/enforcement-adjacent, or a character in a Cory Doctorow novel), you ABSOLUTELY DID NOT SIGN UP FOR THIS.

                                                                                                                                                                                                                                                                                                                                                                                                          It’s terrifying once you think about it, and it should make you want to hug your loved ones a little closer and share a little about what’s going on inside. It’s not all ones and zeroes and dollar signs, it’s real people who are sometimes scared out of their effing minds.


                                                                                                                                                                                                                                                                                                                                                                                                            Gilou boosted

                                                                                                                                                                                                                                                                                                                                                                                                            [?]FlohEinstein (DECT: 3564) » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                            @FlohEinstein@chaos.social

                                                                                                                                                                                                                                                                                                                                                                                                            Working on another sticker for - found this image a while ago, but only as a lowres jpg, so I re-did it as a vector graphic.


                                                                                                                                                                                                                                                                                                                                                                                                            We do not test on animals, we test in production.

                                                                                                                                                                                                                                                                                                                                                                                                            EDIT: Here's the SVG for all of you who asked blog.kohler.is/sticker-we-do-n

                                                                                                                                                                                                                                                                                                                                                                                                            A green no parking sign with the inscription we do not test on animals we test in production showing a bunny, a red heart and a stack of servers going up in flames

Original idea found on https://www.reddit.com/r/ProgrammerHumor/comments/z1z43b/ive_made_a_new_sticker_so_your_projects_has_no by u/AlFlakky (AlexBlintsov)&#10;Used sources from Flaticon.com: Star Icons by Pixel perfect, Hase by torskaya, hacken by juicy_fish, dedizierter Server by Design Circle, Herz by IconBaandar

                                                                                                                                                                                                                                                                                                                                                                                                            Alt...A green no parking sign with the inscription we do not test on animals we test in production showing a bunny, a red heart and a stack of servers going up in flames Original idea found on https://www.reddit.com/r/ProgrammerHumor/comments/z1z43b/ive_made_a_new_sticker_so_your_projects_has_no by u/AlFlakky (AlexBlintsov)&#10;Used sources from Flaticon.com: Star Icons by Pixel perfect, Hase by torskaya, hacken by juicy_fish, dedizierter Server by Design Circle, Herz by IconBaandar

                                                                                                                                                                                                                                                                                                                                                                                                              [?]FlohEinstein (DECT: 3564) » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                              @FlohEinstein@chaos.social

                                                                                                                                                                                                                                                                                                                                                                                                              Why use a URL shortener when you can use a phishy URL extender?

                                                                                                                                                                                                                                                                                                                                                                                                              phishyurl.com/

                                                                                                                                                                                                                                                                                                                                                                                                              Keep your security people alert and awake, generate phishing-looking redirecting links

                                                                                                                                                                                                                                                                                                                                                                                                              https://cheap-bitcoin.online/backdoor-loader/rat-controller/malware_patch.exe?cachecontrol=inject&cookievalue=steal&file=poison&id=fc3188fb&payload=%28function%28%29%7B+return+Math.floor%284.9%29%3B+%7D%29%28%29%3B&port=scan

                                                                                                                                                                                                                                                                                                                                                                                                              Alt...https://cheap-bitcoin.online/backdoor-loader/rat-controller/malware_patch.exe?cachecontrol=inject&cookievalue=steal&file=poison&id=fc3188fb&payload=%28function%28%29%7B+return+Math.floor%284.9%29%3B+%7D%29%28%29%3B&port=scan

                                                                                                                                                                                                                                                                                                                                                                                                                [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                                                                À la demande d'une agence de cybersécurité, Proton Mail a suspendu les comptes de journalistes qui enquêtaient sur des pirates informatiques nord-coréens présumés

                                                                                                                                                                                                                                                                                                                                                                                                                securite.developpez.com/actu/3

                                                                                                                                                                                                                                                                                                                                                                                                                  [?]rk: it’s hyphen-minus actually » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                  @rk@mastodon.well.com

                                                                                                                                                                                                                                                                                                                                                                                                                  HELP I TYPED wc -l WHEN I MEANT nc -l AND NOW I KNOW HOW MANY LINES ARE ON THE INTERNET IT IS FORBIDDEN KNOWLEDGE

                                                                                                                                                                                                                                                                                                                                                                                                                    Matt Marcha boosted

                                                                                                                                                                                                                                                                                                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                                                                    "Tout va bien" on ne marche pas sur la tête...
                                                                                                                                                                                                                                                                                                                                                                                                                    Ou alors si !

                                                                                                                                                                                                                                                                                                                                                                                                                    Des codeurs sont embauchés pour réparer les erreurs commises par l'IA qui provoque leurs licenciements,
                                                                                                                                                                                                                                                                                                                                                                                                                    Spécialiste en nettoyage de code généré par l'IA est le nouveau titre d'emploi en vogue sur les CV

                                                                                                                                                                                                                                                                                                                                                                                                                    emploi.developpez.com/actu/375

                                                                                                                                                                                                                                                                                                                                                                                                                      [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                      @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                                                                      AodeRelay boosted

                                                                                                                                                                                                                                                                                                                                                                                                                      [?]dan_nanni » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                      @dan_nanni@mastodon.social

                                                                                                                                                                                                                                                                                                                                                                                                                      OS-level sandboxing provides kernel-enforced isolation that restricts processes, filesystems, and resources, ensuring applications run in contained and controlled environments

                                                                                                                                                                                                                                                                                                                                                                                                                      Here is a comparison of sandboxing support across different OS 😎👇

                                                                                                                                                                                                                                                                                                                                                                                                                      Find a high-res pdf book with all my related infographics from study-notes.org/cybersecurity-

                                                                                                                                                                                                                                                                                                                                                                                                                        BrianKrebs boosted

                                                                                                                                                                                                                                                                                                                                                                                                                        [?]AA » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                        @AAKL@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                                        Need-to-know, from yesterday.

                                                                                                                                                                                                                                                                                                                                                                                                                        According to Crunchbase, the foudner of FlexSpy spyware is Atir Raihan, from Wilmington, Delaware crunchbase.com/organization/fl

                                                                                                                                                                                                                                                                                                                                                                                                                        From June: "FlexiSpy is an unfunded company based in Victoria (Seychelles), founded in 2005 by Atir Raihan. It operates as a Monitoring app for mobile phones and PCs. FlexiSPY has not raised any funding yet."

                                                                                                                                                                                                                                                                                                                                                                                                                        FlexSpy company profile: tracxn.com/d/companies/flexisp

                                                                                                                                                                                                                                                                                                                                                                                                                        iVerify had a post on FlexSpy late last year:

                                                                                                                                                                                                                                                                                                                                                                                                                        FlexiSPY - The Spyware Tool Crossing the Line Between Security and Crime iverify.io/blog/flexispy-the-s @iverify

                                                                                                                                                                                                                                                                                                                                                                                                                        The Record: Researchers find spyware on phones belonging to Kenyan filmmakers therecord.media/researchers-sp

                                                                                                                                                                                                                                                                                                                                                                                                                        Atlantic Council: Mythical Beasts: Diving into the depths of the global spyware market atlanticcouncil.org/in-depth-r @AtlanticCouncil

                                                                                                                                                                                                                                                                                                                                                                                                                        "The U.S. is the largest investor in the spyware market."

                                                                                                                                                                                                                                                                                                                                                                                                                        The Record: Report: US investors in spyware firms nearly tripled in 2024 therecord.media/us-investors-i therecord.media/us-investors-i

                                                                                                                                                                                                                                                                                                                                                                                                                          [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                          @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                                                                          This morning I received a rather suspicious email from "root@overlinux.com" purporting to be about a tool for monitoring processes on Linux.
                                                                                                                                                                                                                                                                                                                                                                                                                          I am not convinced that's all the tool does.
                                                                                                                                                                                                                                                                                                                                                                                                                          I've written about my suspicions on my blog: blog.kamens.us/2025/09/10/susp
                                                                                                                                                                                                                                                                                                                                                                                                                          If you're the kind of person who likes to dig into stuff like this, you may enjoy reverse-engineering the "spikemon" executable provided by the sender of the email to see if it's doing anything nefarious.

                                                                                                                                                                                                                                                                                                                                                                                                                            Kicou boosted

                                                                                                                                                                                                                                                                                                                                                                                                                            [?]Edwin G. Jolly (Maybe!) 🎄🎅 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                            @EdwinG@mstdn.moimeme.ca

                                                                                                                                                                                                                                                                                                                                                                                                                            Canadian government says individuals’ email addresses and phone numbers associated with CRA, ESDC and CBSA accounts were accessed in a cyberattack.

                                                                                                                                                                                                                                                                                                                                                                                                                            toronto.citynews.ca/2025/09/09
                                                                                                                                                                                                                                                                                                                                                                                                                            - - -
                                                                                                                                                                                                                                                                                                                                                                                                                            Le gouvernement canadien dit que les adresses courriel et les numéros de téléphone associés aux comptes de l'ARC, d’EDSC et de l’ASFC ont été consultés lors d'une cyberattaque.

                                                                                                                                                                                                                                                                                                                                                                                                                            lapresse.ca/actualites/2025-09

                                                                                                                                                                                                                                                                                                                                                                                                                            AodeRelay boosted

                                                                                                                                                                                                                                                                                                                                                                                                                            [?]NLnet Labs » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                            @nlnetlabs@social.nlnetlabs.nl

                                                                                                                                                                                                                                                                                                                                                                                                                            Tomorrow we drop details on the DNSSEC signer we built.
                                                                                                                                                                                                                                                                                                                                                                                                                            Today, we're dropping the pretence.

                                                                                                                                                                                                                                                                                                                                                                                                                            Before we wrote a line of code, we asked 16 TLDs:
                                                                                                                                                                                                                                                                                                                                                                                                                            "What keeps you up at night?"

                                                                                                                                                                                                                                                                                                                                                                                                                            We expected shop talk.
                                                                                                                                                                                                                                                                                                                                                                                                                            We got meaningful discussions that taught us DNSSEC in 2025 isn’t just a tech issue.
                                                                                                                                                                                                                                                                                                                                                                                                                            It’s a control issue.
                                                                                                                                                                                                                                                                                                                                                                                                                            And the fear of losing it is real.

                                                                                                                                                                                                                                                                                                                                                                                                                            👉 Read the full report: blog.nlnetlabs.nl/dnssec-opera

                                                                                                                                                                                                                                                                                                                                                                                                                              Daniel ☀:oh_no_bubble: boosted

                                                                                                                                                                                                                                                                                                                                                                                                                              [?]Mark Wyner Won’t Comply :vm: » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                              @markwyner@mas.to

                                                                                                                                                                                                                                                                                                                                                                                                                              Those “we’ve updated our privacy policy” notifications feel like a trap. And who has time to read every sentence in every one of them? And even if we do, most of us aren’t attorneys, making them nebulous anyway.

                                                                                                                                                                                                                                                                                                                                                                                                                              Thankfully, @Em0nM4stodon has your back with this guide on what to look for.

                                                                                                                                                                                                                                                                                                                                                                                                                              privacyguides.org/articles/202

                                                                                                                                                                                                                                                                                                                                                                                                                                [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                                                                                I'm glad is rolling out a secure backup service <signal.org/blog/introducing-se>, and you should be throwing some money Signal's way on a regular basis regardless of whether you use their paid backup service.
                                                                                                                                                                                                                                                                                                                                                                                                                                However, if you use Android and Google Drive, you can backup Signal into the cloud daily for free with Tasker.

                                                                                                                                                                                                                                                                                                                                                                                                                                🧵1/4

                                                                                                                                                                                                                                                                                                                                                                                                                                  [?]mhoye » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                  @mhoye@mastodon.social

                                                                                                                                                                                                                                                                                                                                                                                                                                  Taggart boosted

                                                                                                                                                                                                                                                                                                                                                                                                                                  [?]Konstantin :C_H: » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                  @kpwn@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                                                  New update for CVE Crowd!

                                                                                                                                                                                                                                                                                                                                                                                                                                  You can now:
                                                                                                                                                                                                                                                                                                                                                                                                                                  - Search for vendors or products to see all related CVEs and discussions
                                                                                                                                                                                                                                                                                                                                                                                                                                  - Browse Bluesky posts alongside Fediverse ones
                                                                                                                                                                                                                                                                                                                                                                                                                                  - Enjoy cleaner feeds thanks to the "similar post counter"

                                                                                                                                                                                                                                                                                                                                                                                                                                  And believe it or not... all of that without any ✨AI💩

                                                                                                                                                                                                                                                                                                                                                                                                                                  Learn more below 🧵

                                                                                                                                                                                                                                                                                                                                                                                                                                    AodeRelay boosted

                                                                                                                                                                                                                                                                                                                                                                                                                                    [?]Paul Chambers🚧 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                    @paul@oldfriends.live

                                                                                                                                                                                                                                                                                                                                                                                                                                    The certificate for the links redirect URL ( links.ssa.gov/ ) in emails from is expired.

                                                                                                                                                                                                                                                                                                                                                                                                                                    Even if they are using a different link url now, they need to keep the old one secure. This is from an email not that long ago.

                                                                                                                                                                                                                                                                                                                                                                                                                                    This particular email link redirects you to the Social Security my SSA login in page which then has buttons to take you to Login.gov or ID.me.

                                                                                                                                                                                                                                                                                                                                                                                                                                    Your connection isn't private

Attackers might be trying to steal your information from links.ssa.gov (for example, passwords,
messages, or credit cards). Learn more about this warning

NETLERR CERT DATE INVALID

Subject: links ssa gov

Issuer: GoGetSSL RSA DV CA

Expires on: July 16,2025

Current date: Sep 7, 2025

PEM encoded chain:

                                                                                                                                                                                                                                                                                                                                                                                                                                    Alt...Your connection isn't private Attackers might be trying to steal your information from links.ssa.gov (for example, passwords, messages, or credit cards). Learn more about this warning NETLERR CERT DATE INVALID Subject: links ssa gov Issuer: GoGetSSL RSA DV CA Expires on: July 16,2025 Current date: Sep 7, 2025 PEM encoded chain:

                                                                                                                                                                                                                                                                                                                                                                                                                                    ® Social Security
Sign In or Create an Account
By signing in or creating an account, you agree to the Privacy Act Statement and
If you already have a IEeiR NR ABRLE account, do not create a new one. You c
Security services.
sign in with ID.me
© The Social Security usemame sign-in option is no longer available. Please us
[Z Create an account with Login.gov
[2 Create an account with ID.me
© Sign in Help and Support
External Site Disclaimer
OMB No. 0960-0789 Privacy Policy Accessibility Help

                                                                                                                                                                                                                                                                                                                                                                                                                                    Alt...® Social Security Sign In or Create an Account By signing in or creating an account, you agree to the Privacy Act Statement and If you already have a IEeiR NR ABRLE account, do not create a new one. You c Security services. sign in with ID.me © The Social Security usemame sign-in option is no longer available. Please us [Z Create an account with Login.gov [2 Create an account with ID.me © Sign in Help and Support External Site Disclaimer OMB No. 0960-0789 Privacy Policy Accessibility Help

                                                                                                                                                                                                                                                                                                                                                                                                                                      mmu_man boosted

                                                                                                                                                                                                                                                                                                                                                                                                                                      [?]Shawn Webb » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                      @lattera@bsd.network

                                                                                                                                                                                                                                                                                                                                                                                                                                      My presentation titled "Weird Code Injection Techniques on Using " has been accepted at !

                                                                                                                                                                                                                                                                                                                                                                                                                                        [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                        @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                                                                                        is rolling out mandatory#MFA for its portals. Great!
                                                                                                                                                                                                                                                                                                                                                                                                                                        But rather than supporting even a single industry standard medium or strong MFA type, they're supporting only two deprecated types and Yet Another Proprietary MFA App. Not great! Really awful, actually!
                                                                                                                                                                                                                                                                                                                                                                                                                                        God damn it, why do companies that absolutely know better keep pulling this shit.
                                                                                                                                                                                                                                                                                                                                                                                                                                        Oracle proves, yet again, that they suck.

                                                                                                                                                                                                                                                                                                                                                                                                                                        
Screenshot of email from Oracle with the below text. The words "Oracle Mobile Authenticator, Mobile SMS or email ID-based One-Time Password" are highlighted in the screenshot. 

MFA is a quick extra step to keep your account—and data—safer.
Why MFA?
* Stops unauthorized logins—even if your password is known.
* Easy setup in under 5 minutes.

How will this affect you?
* MFA adds an extra layer of security by requiring a second verification step when signing into Oracle owned portals (like Cloud Customer Connect, My Oracle Support, Oracle Customer Center, etc.)
* This will not affect products purchased from Oracle.
* MFA helps prevent unauthorized access even if your account password is compromised.
* You will use MFA each time you log in to any Oracle owned applications.

How to prepare:
* Once enabled, you will be prompted to enroll in MFA upon your first login at any Oracle portal. Watch this video to see the setup process.
* Follow the on-screen guide to choose your preferred MFA method (Oracle Mobile Authenticator, Mobile SMS or email ID-based One-Time Password), enter details, and verify your code.
* Oracle Mobile Authenticator (OMA) is available on Windows, Android, and Apple
* That’s it—next login you’ll enter your password plus complete your MFA method of choice.

                                                                                                                                                                                                                                                                                                                                                                                                                                        Alt... Screenshot of email from Oracle with the below text. The words "Oracle Mobile Authenticator, Mobile SMS or email ID-based One-Time Password" are highlighted in the screenshot. MFA is a quick extra step to keep your account—and data—safer. Why MFA? * Stops unauthorized logins—even if your password is known. * Easy setup in under 5 minutes. How will this affect you? * MFA adds an extra layer of security by requiring a second verification step when signing into Oracle owned portals (like Cloud Customer Connect, My Oracle Support, Oracle Customer Center, etc.) * This will not affect products purchased from Oracle. * MFA helps prevent unauthorized access even if your account password is compromised. * You will use MFA each time you log in to any Oracle owned applications. How to prepare: * Once enabled, you will be prompted to enroll in MFA upon your first login at any Oracle portal. Watch this video to see the setup process. * Follow the on-screen guide to choose your preferred MFA method (Oracle Mobile Authenticator, Mobile SMS or email ID-based One-Time Password), enter details, and verify your code. * Oracle Mobile Authenticator (OMA) is available on Windows, Android, and Apple * That’s it—next login you’ll enter your password plus complete your MFA method of choice.

                                                                                                                                                                                                                                                                                                                                                                                                                                          AodeRelay boosted

                                                                                                                                                                                                                                                                                                                                                                                                                                          [?]BobDaHacker 🏳️‍⚧️ (39C3 ☎️ 24630) » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                          @bobdahacker@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                                                          🍔 Just collabed with @BobTheShoplifter on a MASSIVE SECURITY BREACH: We exposed how Restaurant Brands International (Burger King, Tim Hortons, Popeyes) left their drive-thru systems etc completely vulnerable.

                                                                                                                                                                                                                                                                                                                                                                                                                                          🎯 What we found:
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Unauthenticated API access to ALL drive-thru locations globally
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Drive-thru voice recordings of customers accessible
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Employee PII exposed.
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Bathroom feedback systems with zero auth
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Hardcoded passwords in client-side code

                                                                                                                                                                                                                                                                                                                                                                                                                                          The scope was insane - we could access any drive-thru system globally. Even listen to your actual drive-thru orders 👂

                                                                                                                                                                                                                                                                                                                                                                                                                                          Credit to RBI for lightning-fast response once disclosed, but the privacy implications were staggering.

                                                                                                                                                                                                                                                                                                                                                                                                                                          Full technical breakdown: bobdahacker.com/blog/rbi-hacke

                                                                                                                                                                                                                                                                                                                                                                                                                                            [?]Sheldon » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                            @sysop408@sfba.social

                                                                                                                                                                                                                                                                                                                                                                                                                                            Well, the dumb scammer saga continues. Yesterday the same people sent me a poor attempt at phishing, but forgot to update the default subject line from the free service they were using to help them create these fraudulent emails.

                                                                                                                                                                                                                                                                                                                                                                                                                                            So today, they resent the email with the correct subject. I'm surprised the idiots didn't also update the email to apologize for hitting send too quickly.

                                                                                                                                                                                                                                                                                                                                                                                                                                            This is another email from some scammers pretending to be from a law firm accusing me of using copyrighted music and insisting that I take it down or face immediate international litigation. The whole point is to get me to click a malicious link.

They screwed this up the day before by forgetting to change the default subject line since they're using a free service to help them compose these fraudulent emails. Today, the subject line is updated, but someone messed up the email body by typing in a random "F" at the start.

                                                                                                                                                                                                                                                                                                                                                                                                                                            Alt...This is another email from some scammers pretending to be from a law firm accusing me of using copyrighted music and insisting that I take it down or face immediate international litigation. The whole point is to get me to click a malicious link. They screwed this up the day before by forgetting to change the default subject line since they're using a free service to help them compose these fraudulent emails. Today, the subject line is updated, but someone messed up the email body by typing in a random "F" at the start.

                                                                                                                                                                                                                                                                                                                                                                                                                                              [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                              @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                                                                                              Today's is about telephone scammers and the shitty tech that enables them.
                                                                                                                                                                                                                                                                                                                                                                                                                                              I have an eldery relative whom I help pretty extensively with managing his medical care and his everyday life. I currently have his home phone forwarding to mine while he's in rehab.
                                                                                                                                                                                                                                                                                                                                                                                                                                              In the past 24 hours I have received no less than *** 17 *** scam/spam calls to that phone number. That's a typical, not at all unusual volume for these calls.

                                                                                                                                                                                                                                                                                                                                                                                                                                              🧵1/7

                                                                                                                                                                                                                                                                                                                                                                                                                                                [?]nixCraft 🐧 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                @nixCraft@mastodon.social

                                                                                                                                                                                                                                                                                                                                                                                                                                                Over the past few days Cloudflare has been notified through our vulnerability disclosure program and the certificate transparency mailing list that unauthorized certificates were issued by Fina CA for 1.1.1.1, one of the IP addresses used by our public DNS resolver service.

                                                                                                                                                                                                                                                                                                                                                                                                                                                blog.cloudflare.com/unauthoriz

                                                                                                                                                                                                                                                                                                                                                                                                                                                This is a general reminder that you don't need Cloudflare or any central DNS provider.

                                                                                                                                                                                                                                                                                                                                                                                                                                                  [?]Sheldon » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                  @sysop408@sfba.social

                                                                                                                                                                                                                                                                                                                                                                                                                                                  Whomever sent me this phishing email wins my dumbest scammers of the week award. They forgot to update the default subject line before sending this email.

                                                                                                                                                                                                                                                                                                                                                                                                                                                  Screenshot of a phishing email. It's a take DMCA takedown request ordering you to cease and desist use of a certain copyrighted song in a video you posted to Facebook. A lot of it looks believable, but the subject line reads "I found a mail merge tool for Gmail."

                                                                                                                                                                                                                                                                                                                                                                                                                                                  Alt...Screenshot of a phishing email. It's a take DMCA takedown request ordering you to cease and desist use of a certain copyrighted song in a video you posted to Facebook. A lot of it looks believable, but the subject line reads "I found a mail merge tool for Gmail."

                                                                                                                                                                                                                                                                                                                                                                                                                                                    [?]⁢Ƥĥąɳʈȯɱ :fedora: 🎸 🏳️‍🌈 ⁂ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                    @Steve12L@mamot.fr

                                                                                                                                                                                                                                                                                                                                                                                                                                                    La police aux frontières des États-Unis peut utiliser les logiciels espion de
                                                                                                                                                                                                                                                                                                                                                                                                                                                    next.ink/198382/limmigration-d

                                                                                                                                                                                                                                                                                                                                                                                                                                                      [?]Hack in Days of Future Past » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                      @allainyann@piaille.fr

                                                                                                                                                                                                                                                                                                                                                                                                                                                      @HalvarFlake a (the?) Respected hacker shares razor-sharp reflections: cybersecurity tooling is still artisanal; the exploit market is exploding—few can deliver, demand is inelastic, and governments pay big; AI helps, but only in expert hands (“a sherpa”); drones aren’t cheap planes—they’re expensive bullets; and Western manufacturing lost its edge by abandoning scale for boutique precision. Efficiency ≠ resilience. Essential listening for the next-gen hackers. Learn from those who shaped the scene. ▶️ a rare chance to step back and reflect (so take time to watch this interview IMHO) 👍

                                                                                                                                                                                                                                                                                                                                                                                                                                                        [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                        @brian_greenberg@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                                                                        I’m excited to share my latest article, published in Forbes: Deepfakes And Social Engineering: A Growing Threat To Everyone.

                                                                                                                                                                                                                                                                                                                                                                                                                                                        This piece is personal to me because I’ve seen how quickly deepfake technology is moving from novelty to real-world attacks. It’s not just companies at risk—families are being targeted with AI-cloned voices and fake video calls.

                                                                                                                                                                                                                                                                                                                                                                                                                                                        In the article, I break down the real cases we’re seeing, why multifactor authentication (MFA) is essential, and what both organizations and individuals like you and me can do to protect ourselves.

                                                                                                                                                                                                                                                                                                                                                                                                                                                        In the piece, I cover:
                                                                                                                                                                                                                                                                                                                                                                                                                                                        🔍 Real-world scams driven by AI voice and video
                                                                                                                                                                                                                                                                                                                                                                                                                                                        🔐 Why multifactor authentication (MFA) is essential
                                                                                                                                                                                                                                                                                                                                                                                                                                                        📱 How both organizations and families can verify smarter
                                                                                                                                                                                                                                                                                                                                                                                                                                                        🧠 The mindset shift from trusting appearances to verifying identities

                                                                                                                                                                                                                                                                                                                                                                                                                                                        Deepfakes aren’t a future problem. They’re here. And the time to prepare is now.

                                                                                                                                                                                                                                                                                                                                                                                                                                                        forbes.com/councils/forbestech

                                                                                                                                                                                                                                                                                                                                                                                                                                                        @forbes@flipboard.com @Forbes@newsie.social @forbestechcncl

                                                                                                                                                                                                                                                                                                                                                                                                                                                          CapsLock boosted

                                                                                                                                                                                                                                                                                                                                                                                                                                                          [?]BeyondMachines :verified: » 🤖 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                          @beyondmachines1@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Critical Bluetooth vulnerability reported in SunPower Solar Inverters

                                                                                                                                                                                                                                                                                                                                                                                                                                                          A critical unpatched vulnerability (CVE-2025-9696) in SunPower PVS6 photovoltaic inverters allows attackers within Bluetooth range to exploit hard-coded credentials and bypass authentication to gain unauthorized control over critical functions including firmware replacement, power production disabling, and grid settings modification. CISA recommends isolating inverter networks and disabling Bluetooth interfaces when not needed. SunPower has not responded to coordinated disclosure attempts.

                                                                                                                                                                                                                                                                                                                                                                                                                                                          **If you have SunPower PVS6 inverters, review the advisory and if not actively needed disable their Bluetooth interface when not actively servicing. Implement strong physical security around the devices since attackers can take control from up to 170 feet away. Make sure that the wired connections are isolated from the internet. Use VPN-based wired connections instead of Bluetooth for remote management.**

                                                                                                                                                                                                                                                                                                                                                                                                                                                          beyondmachines.net/event_detai

                                                                                                                                                                                                                                                                                                                                                                                                                                                            [?]Fedi.Garden ☃️ » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                            @FediGarden@social.growyourown.services

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Freeradical.zone is a Mastodon server about infosec, privacy, technology, leftward politics, cats and dogs.

                                                                                                                                                                                                                                                                                                                                                                                                                                                            This server has been online since 2017.

                                                                                                                                                                                                                                                                                                                                                                                                                                                            :Fediverse: freeradical.zone

                                                                                                                                                                                                                                                                                                                                                                                                                                                            You can find out more at freeradical.zone/about or contact the admin @tek

                                                                                                                                                                                                                                                                                                                                                                                                                                                              [?]cR0w » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                              @cR0w@infosec.exchange

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Angry chihuahua: INFOSEC industry talking about preventing evil.

Happy chihuahua: INFOSEC industry when actual evil does something evil.

                                                                                                                                                                                                                                                                                                                                                                                                                                                              Alt...Angry chihuahua: INFOSEC industry talking about preventing evil. Happy chihuahua: INFOSEC industry when actual evil does something evil.

                                                                                                                                                                                                                                                                                                                                                                                                                                                                [?]Timo Zimmermann » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                                @fallenhitokiri@social.screamingatmyscreen.com

                                                                                                                                                                                                                                                                                                                                                                                                                                                                „username and password aren’t secure enough!“

                                                                                                                                                                                                                                                                                                                                                                                                                                                                „No, no OTPs, I need a second device and in an imaginary scenario I maneuvered myself into I don’t have access to it“

                                                                                                                                                                                                                                                                                                                                                                                                                                                                „No, not via email, that’s insecure and not available, because I use company hardware privately.“

                                                                                                                                                                                                                                                                                                                                                                                                                                                                „Passkeys are big tech vendor trash! Syncing them? Please! That defeats t3h security AND invalidates all my arguments!“

                                                                                                                                                                                                                                                                                                                                                                                                                                                                „I know what I am doing, my password is surperior so I am safe!“

                                                                                                                                                                                                                                                                                                                                                                                                                                                                I love

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  [?]Jonathan Kamens 86 47 » 🌐
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  @jik@federate.social

                                                                                                                                                                                                                                                                                                                                                                                                                                                                  I just discovered that "Employer on the Go", a website I am required to use by my employer for downloading pay stubs and entering time-off requests, implements "remember me" by saving my username and password in a plaintext browser cookie.
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  yhgtbfkmwts
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  It gets worse. They use "&" in the cookie as the separator between key/value pairs, and it's not quoted in values, so if there's a "&" in your password then they truncate it and don't pre-fill it properly on the login page.