i've always liked studying digital security but i've found few sources of learning. i'd like to meet someone to study it with, so i've made a post to briefly talk about the history of cyber security. follow along here and leave me a HANDSHACK or even your comment. Thank you https://chat-to.dev/post?id=390#programming#cybersecurity
There was no stream last night as I had my best friend from when I was in school in Israel look me up after a decade and hang out with me on his way to a summer trip. It was great spent a few hours reliving old memories and having some drinks.
I'll probably be on #Twitch and #tiktok tonight for my livestream to catch up on the tinkering projects I have been doing, and maybe some #GamingonLinux
Last year, CrowdStrike published a report on a new crypto-mining operation that was targeting exposed Kubernetes systems with a miner for the Dero cryptocurrency token.
The Cyber Partisans say they hacked the Belarusian State University.
The group claims it obtained documents and audio records from the university's internal network showing how its leadership dismissed staff and students who participated in anti-government protests.
The files show that the university declined to admit new students who participated in protests and left comments online against the dictatorship.
Analyst1 has published a report that looks at the history of a ransomware operation named RansomHouse.
Researchers say the platform has been used by threat actors with links to ransomware gangs such as White Rabbit, Mario ESXi, RagnarLocker, and Dark Angels (Dunghill Leak).
Stylized 3D illustration for an early-2000s article in the Dutch PC-Active magazine, about a mobile phone virus. This was before smartphones were introduced. 🙂