javajuggler, to internet

i've always liked studying digital security but i've found few sources of learning. i'd like to meet someone to study it with, so i've made a post to briefly talk about the history of cyber security. follow along here and leave me a HANDSHACK or even your comment. Thank you https://chat-to.dev/post?id=390 #programming #cybersecurity

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

Russia and China are using OpenAI tools to spread disinformation https://arstechnica.com/?p=2027948&utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

chiefgyk3d, to Twitch
@chiefgyk3d@social.chiefgyk3d.com avatar

There was no stream last night as I had my best friend from when I was in school in Israel look me up after a decade and hang out with me on his way to a summer trip. It was great spent a few hours reliving old memories and having some drinks.

I'll probably be on #Twitch and #tiktok tonight for my livestream to catch up on the tinkering projects I have been doing, and maybe some #GamingonLinux

#Infosec #Cybersecurity #Gaming #Streamer

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Many are the tricksters preying upon the innocent and the naive. May Set feast upon their souls. https://cromwell-intl.com/cybersecurity/scams-spam-phishing.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Wizards have many secret tongues, some of them are based on the most challenging arithmetic problems which puzzled even the ancient Korinthian mathematicians. https://cromwell-intl.com/cybersecurity/how-rsa-works.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

When warlords take power, they are ill-inclined to relinquish it. #cybersecurity #cyberwar https://cromwell-intl.com/cybersecurity/cyberwar/myanmar.html?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

A cautious warrior keeps apprised of news, how else does one learn of new threats and weapons? https://cromwell-intl.com/cybersecurity/bulletins.html?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
campuscodi, to infosec
@campuscodi@mastodon.social avatar

David Ross, one of the early pioneers of browser security research, has passed away, his family announced on Twitter.

In 1999, together with Georgi Guninski, he authored the first paper on XSS attacks named "Script Injection".

He also worked on implementing X-Frame-Options in Internet Explorer.

https://x.com/randomdross/status/1799284146231185584

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
campuscodi, to infosec
@campuscodi@mastodon.social avatar

Last year, CrowdStrike published a report on a new crypto-mining operation that was targeting exposed Kubernetes systems with a miner for the Dero cryptocurrency token.

https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/

This threat actor—no official name yet—is still active today, according to a new report from cloud security firm Wiz.

https://www.wiz.io/blog/dero-cryptojacking-campaign-adapts-to-evade-detection

#infosec #cybersecurity #security

campuscodi, to infosec
@campuscodi@mastodon.social avatar

The Cyber Partisans say they hacked the Belarusian State University.

The group claims it obtained documents and audio records from the university's internal network showing how its leadership dismissed staff and students who participated in anti-government protests.

The files show that the university declined to admit new students who participated in protests and left comments online against the dictatorship.

https://www.by.cpartisans.org/en/post/bsu-uncut-2020-2024-part-1 #infosec #cybersecurity #security

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

Law enforcement operation takes aim at an often-overlooked cybercrime linchpin https://arstechnica.com/?p=2027800&utm_source=dlvr.it&utm_medium=mastodon

campuscodi, to infosec
@campuscodi@mastodon.social avatar

Analyst1 has published a report that looks at the history of a ransomware operation named RansomHouse.

Researchers say the platform has been used by threat actors with links to ransomware gangs such as White Rabbit, Mario ESXi, RagnarLocker, and Dark Angels (Dunghill Leak).

https://analyst1.com/ransomhouse-stolen-data-market-influence-operations-amp-other-tricks-up-the-sleeve/

Not to be confused with RansomHub, which is a different ransomware group.

campuscodi, to infosec
@campuscodi@mastodon.social avatar

The threat actor behind the Kuiper ransomware tried to sell its source code on the XSS hacking forums only to get immediately banned back in April

https://x.com/Libranalysis/status/1778036668236222483

#infosec #cybersecurity #security

campuscodi, (edited ) to random
@campuscodi@mastodon.social avatar

The EU Agency for Law Enforcement Training (CEPOL) says it was the victim of a cyberattack:

https://www.cepol.europa.eu/newsroom/news/cyber-incident-eu-agency-law-enforcement-training-cepol

campuscodi, (edited ) to random
@campuscodi@mastodon.social avatar

Security firm watchTowr has published its own analysis of CVE-2024-4577, a PHP-CGI vulnerability impacting Windows systems: https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/

The bug was initially discovered by DEVCORE: https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/

watchTowr has also released proof-of-concept code: https://github.com/watchtowrlabs/CVE-2024-4577 #infosec #cybersecurity #security

thejapantimes, to Japan
@thejapantimes@mastodon.social avatar

The popular Japanese video-sharing website Niconico has suspended its services due to a cyberattack, its operator announced. https://www.japantimes.co.jp/news/2024/06/09/japan/video-sharing-site-niconico-cyberattack/

metin, to infosec
@metin@graphics.social avatar

From the ar(t)chive…

Stylized 3D illustration for an early-2000s article in the Dutch PC-Active magazine, about a mobile phone virus. This was before smartphones were introduced. 🙂

#infosec #cybersecurity #security #safety #virus #malware #cartoon #design #artwork #sculpture #3DModeling #illustration #illustrator #art #arte #artist #DigitalArt #ArtMatters #GraphicDesign #3D #B3D #CreativeToots #FediArt #MastoArt #ArtistsOnMastodon

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Oft-times the most commonly used tools are wielded casually. But there is much subtlety, far more than a casual glance reveals. Understand these tools if you with to wield them well. https://cromwell-intl.com/cybersecurity/how-browsers-use-https.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

Exploring Windows 11 Enterprise Testing | Yubikey Firmware Update | Homelab Upgrade Plans and Progress | Cybersecurity and Chill | Gaming on Linux on Twitch. Dive in with me: https://twitch.tv/chiefgyk3d

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Rogues lurk along the silk and spice trading routes, misdirecting the unwary into their traps. https://cromwell-intl.com/cybersecurity/bgp-hijacking.html?s=mc

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • ngwrru68w68
  • InstantRegret
  • thenastyranch
  • magazineikmin
  • GTA5RPClips
  • rosin
  • osvaldo12
  • tacticalgear
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • JUstTest
  • modclub
  • everett
  • provamag3
  • cubers
  • cisconetworking
  • ethstaker
  • Durango
  • mdbf
  • anitta
  • megavids
  • normalnudes
  • tester
  • lostlight
  • All magazines