worteks_com, to opensource French
@worteks_com@mastodon.social avatar

🔒 C'est la Journée Mondiale du Mot de Passe ! 🔑

Le rappel idéal pour penser à mettre à jour ses mots de passe trop vieux et plus assez sécurisés.

Et quel meilleur moment que celui-ci pour vous annoncer la sortie de la nouvelle version de Self Service Password : https://projects.ow2.org/view/ldaptoolbox/ltb-self-service-password-1-6-0-released/ !

@ow2

ltb_project, to php French
@ltb_project@floss.social avatar

🎉 LDAP Tool Box Self Service Password 1.6 released!

➡️ https://projects.ow2.org/view/ldaptoolbox/ltb-self-service-password-1-6-0-released/

📃 A lot of new features like entropy bar, dynamic checks and mail/phone attributes modification

:php: @ow2 @worteks_com

Karlitschek, to random
@Karlitschek@mastodon.social avatar

Really impressive. The german state Schleswig Holstein is rolling out their Open Source strategy. https://www.schleswig-holstein.de/DE/landesregierung/ministerien-behoerden/I/Presse/PI/2024/CdS/240403_cds_it-arbeitsplatz.html

alex_mastodon,
@alex_mastodon@troet.cafe avatar

@Karlitschek
TL;DR "It's only the start to migrate 30000 municipal and state computers from #MSoffice to #LibreOffice.
It will be followed by switching from #Windows to #Linux, from #SharePoint to the collaboration platform #Nextcloud, from proprietary #Exchange to #OpenXchange and from #Outlook to #Thunderbird with #Univention AD-Connector.
A libre service like #ActiveDirectory will be implemented and #FLOSS telephone systems instead of #Cisco bought. Governmental office software will follow."

publicvoit, to security German
@publicvoit@graz.social avatar

mit einem Konzept, wie man Firmen und Behörden -mäßig absichern kann: https://blog.fefe.de/?ts=9b101de1

TL;DR:

, , und raus.

Webapplications und dumme, gehärtete -Terminals rein. Keine Daten lokal.

YourAnonRiots, to vmware Japanese
@YourAnonRiots@mstdn.social avatar

🚨 Attention users!

New flaws identified (CVE-2024-22245 & CVE-2024-22250) in the EAP plugin. Attackers could exploit them to hijack accounts and privileged EAP sessions.

UNINSTALL it immediately.

https://thehackernews.com/2024/02/vmware-alert-uninstall-eap-now-critical.html

YourAnonRiots, to windows Japanese
@YourAnonRiots@mstdn.social avatar
publicvoit, to microsoft
@publicvoit@graz.social avatar

@alex (this one: https://en.wikipedia.org/wiki/Alex_Stamos) on the latest Security Team hack allegedly by and Microsoft's public incident response including appropriate "translations" by Alex:

"Microsoft's Dangerous Addiction To Revenue" https://www.linkedin.com/pulse/microsofts-dangerous-addiction-security-revenue-alex-stamos-1ukzc

TL;DR: MS fucks up big time and is using that for selling more of their security services.

Background: https://www.wired.com/story/microsoft-hpe-midnight-blizzard-email-breaches/

puniko, to random

​:neocat_woozy:​ eeh, there seems to be a DNS issue

kkarhan,
@kkarhan@mstdn.social avatar

@fuchsiii @TimWardCam @puniko Worse: !

There's a reason why I have over a dozen Servers setup on my networks:
https://github.com/greyhat-academy/lists.d/blob/main/dns.servers.list.tsv

kylewritescode, to linux
@kylewritescode@allthingstech.social avatar
afif, (edited ) to random
@afif@mastodon.social avatar

I’ve been on standby in the Art dept all week for an exam. The previous Intel iMacs had been so unreliable, they used to make us come stand by in every other class and especially during exams.

The new Silicon iMacs have been more reliable and problem-free but they still insist on someone coming just in case. Sitting there for 5 hours a day seems like a colossal waste of my talents but who am I to argue with customer requests

afif,
@afif@mastodon.social avatar

After months of searching online for solutions (to no avail), I got the bright idea to set our local AD (we had 3 replicating servers across the site) in the Directory Utility and also set the AD IP address in the hosts file. It solved the login problem once and for all

afif,
@afif@mastodon.social avatar

Apparently when a user logs in, it randomly searches between those 3 AD servers. The one far away always dont authorize the connection hence the issue.

adminmagazine, to sysadmin
@adminmagazine@hachyderm.io avatar
adminmagazine, to python
@adminmagazine@hachyderm.io avatar

ADMIN : Domain-Driven Design is available now! Remember you can get it faster and at the best price if you buy from us https://www.admin-magazine.com/Archive/2023/78

dedsyn4ps3, to proxmox
@dedsyn4ps3@fosstodon.org avatar

Ohhh boy...and something else arrived early! 🤗

It's about damn time I build myself a legit rack to house my growing inventory of electronic goodness! Not sure where I should even start!!! server on my , or expand my test lab? Ugh decisions decisions 🙄 🤔🙃 :raspberrypi:

markmorow, to microsoft

You might have missed this pre all the Ignite news, but you can now choose to have password resets remediate the risk for your users. https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/remediate-user-risks-in-microsoft-entra-id-protection-through-on/ba-p/3773129. This is a big deal if you are not using Self-Service Password Reset flows. I’ve been working with customers a lot lately on enabling risk based conditional access for and sometimes they have a different password reset solution that also includes pushing these passwords to things like LDAP, mainframes, etc. And if they dont have a PCS type tool on AD, they don't want to use the one because these passwords become out of sync on the different directories. This feature is super helpful for them to remediate risky users after they do a password change on-prem. Give this a look and enable risk based conditional access policies if you can.

BishopFox, to azure

“Recently, one of our pen testers found a bastion host during an assumed-breach . We were given the credentials of an employee within Azure Active Directory. The pen tester was able to log into SSH with Azure credentials. So, he got onto the bastion host, which was a box. One of the users on that box made their home directory world readable for everyone. He rifled through that user’s directory and found credentials for Snowflake, a third-party database service. He used those credentials to connect to the 3rd-party provider and gained access to production .” - @sethsec on a recent episode of the Cloud Security Podcast.

https://bfx.social/3sr7t2i

raptor, to random
BishopFox, to random

More observations: Bringing the bypasses! Just in case won't let you send telemetry traffic into the void.

BishopFox, to random

Local zones take first priority in . Make sure your doesn't depend entirely on name resolution... (thanks to Jim Sykora and Jake Hildreth for the great talk!) @WWHackinFest

briankrebs, (edited ) to random

The Fake Browser Update Scam Gets a Big Makeover

One of the oldest malware tricks in the book — hacked websites claiming visitors need to update their Web browser before they can view any content — has roared back to life in the past few months. New research shows the attackers behind one such scheme have developed an ingenious way of keeping their malware from being taken down by security experts or law enforcement: By hosting the malicious files on a decentralized, anonymous cryptocurrency blockchain.

https://krebsonsecurity.com/2023/10/the-fake-browser-update-scam-gets-a-makeover/

kkarhan,
@kkarhan@mstdn.social avatar

@10volt @briankrebs when was that added and how is it even called?

And no, is not a paclage manager since neither @ubuntu nor act a s paclage mnager...

davidho, to random
@davidho@mastodon.world avatar

What is common knowledge in your field but shocks outsiders?

More than half the CO₂ emissions of the industrial age have been dumped into the atmosphere since 1990.

publicvoit,
@publicvoit@graz.social avatar

@RestlessLipSyndrome @davidho I very much dislike the spin of mapping the stupid decisions of Bob the CEO of giving Linda an IT environment where simply opening up attachments or URLs - which is part if her job - may cause the whole company get hacked.

We professionals need to fix that spin that clearly supports the megacorps selling insecure crap instead of investing in real-world security.

heisec, to security German

Samba: Neue Versionen beheben mehrere Sicherheitslücken

Durch verschiedene Programmierfehler konnten Angreifer auf geheime Informationen bis hin zum Kerberos-TGT-Passwort zugreifen. Aktualisierungen stehen bereit.

https://www.heise.de/news/Samba-Neue-Versionen-beheben-mehrere-Sicherheitsluecken-9335169.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

drsbaitso, to windows

Good Monday morning, Fediverse! I'm looking for my next role, hoping to get .

Right now I'm a principal engineer and team lead for certificate infrastructure at a major US company. My day-to-day work focuses on PKI infrastructure/operations, Windows, and Active Directory. I get to help developers understand both the Why and How of the best practices for using certificates, along with keeping the certificate infrastructure humming along.

Working with Information Security, we've implemented company-wide multi-factor authentication for ~30,000 people. I've designed and executed migrating from on-prem PKI (Microsoft ADCS) to Certificates-As-A-Service, which reduced our total operating costs by about half. The includes dropping our datacenter footprint from multiple physical devices down to a couple of VMs.

Outside of the technical responsibilities, I'm mentoring and training junior/new teammates to build their skills and their confidence. Feedback from the management of our development and applications teams is that I've reinvigorated relationships and made certificate discussions something folks look forward to. And while nobody enjoys an outage, both managers and fellow individual contributors have told me that my calm, confident, and methodical presence is critical to both morale and quick resolution.

My current position doesn't offer much in the way of Azure exposure, but in my previous role I built out a Windows Virtual Desktop (now Azure Virtual Desktop, AVD) ecosystem from scratch when the pandemic first began and we had to send everyone to work from home on super-short notice. Nobody missed a day of work for lack of technical resources.

What I want from my next role is either a similar technical lead/principal level infrastructure/operations IC position or moving into management of a similar team.

If you're looking for a technical leader (with or without management responsibilities) to help shape and maintain your Windows/Active Directory environment, someone who can build relationships across a large organization, let's chat. DM me for email or Signal.

Current residence is in Syracuse, NY, but I'm open to relocation.

Boosts appreciated.

ssamulczyk, to security
@ssamulczyk@mstdn.social avatar

They’ve made me / Subject Matter Expert at work! I hope they know what they’re doing!🙏🤡

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • cisconetworking
  • thenastyranch
  • GTA5RPClips
  • everett
  • Durango
  • rosin
  • InstantRegret
  • DreamBathrooms
  • magazineikmin
  • Youngstown
  • mdbf
  • slotface
  • ethstaker
  • megavids
  • kavyap
  • normalnudes
  • modclub
  • cubers
  • ngwrru68w68
  • khanakhh
  • tacticalgear
  • tester
  • provamag3
  • Leos
  • osvaldo12
  • anitta
  • lostlight
  • All magazines