andre, to sysadmin
@andre@fedi.jaenis.ch avatar

I'm trying to wrap my head around security aspects of IPv6 protocol.

From what I've learned that now my networking devices have a public IP address (unlike with IPv4 which would have to be port translated at the router).

In order to talk to a service I still will need a port next to the IP address.

Does that mean that every device in the network should have a firewall? Or can I still have one at the router level handle everything?

My fear is that a router could be easily bypassed.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

UK Ministry of Defence Suffers Major Data Breach, China’s Involvement Suspected https://thecyberexpress.com/uk-ministry-of-defence-data-breach/?utm_source=dlvr.it&utm_medium=mastodon

tech, to tech
@tech@unfufadoo.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
cigitalgem, to ai
@cigitalgem@sigmoid.social avatar

CalypsoAI produced a video for RSA abojut #MLsec #AI #ML #security #infosec #LLM

Watch as I interview Jim Routh and Neil Serebryany.

https://berryvilleiml.com/2024/05/10/video-interview-a-deep-dive-into-generative-ai-and-cybersecurity/

smach, to LLMs
@smach@masto.machlis.com avatar

“The general problem of mixing data with commands is at the root of many of our computer security vulnerabilities.” Great explainer by security researcher Bruce Schneier on why large language models may not be a great choice for tasks like processing your emails.
https://cacm.acm.org/opinion/llms-data-control-path-insecurity/

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
chiefgyk3d, to python
@chiefgyk3d@social.chiefgyk3d.com avatar

I was up late trying to figure out a stupid issue I was having with the Crowdstrike API so I didn't stream on twitch last night, hoping to do a stream tonight. I think they took a feature out my team was actually using which would allow me to contain a device and make a note that could be viewed in the dashboard.

#Coding #Crowdstrike #Python #Dev #InfoSec #Cybersecurity

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
north, to Cybersecurity
@north@xn--8r9a.com avatar

I'll give this a shot.

I'm looking to for a role in . I've done both offensive (see e.g. https://github.com/qwell/disclosures/) and defensive security work, and have over 20 years of software development experience in many different languages.

ISC2 CC

DMs always open.

(we should pick a hashtag and stick with it)

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
Morishima, to security
@Morishima@ieji.de avatar

It has been pointed out that Vivaldi's "Speed Dials" feature with no ads or affiliate listings is problematic.
Any plans for improvement, @Vivaldi?

Details: https://nitter.poast.org/Yuki27183/status/1787955010837561361#m

michael, to infosec
@michael@thms.uk avatar

Seriously Apple? Seriously? and then we are surprised people fall for phishing scams despite 2FA 🤦‍♂️

#infosec #Apple #fail #2fa

johnleonard, to privacy
@johnleonard@mastodon.social avatar

'TunnelVision' bug potentially allows snooping on all VPNs

Operating system features can be manipulated to divert traffic away from encrypted VPN tunnel

https://www.computing.co.uk/news/4205875/tunnelvision-bug-potentially-allows-snooping-vpns

michael, to infosec
@michael@thms.uk avatar

Remember guys: hosting in the cloud doesn’t mean you don’t need backups: always have backups that are stored with an independent third party!

https://www.datacenterdynamics.com/en/news/unisuper-private-cloud-outage-caused-by-google-cloud-issues/

tech, to tech
@tech@unfufadoo.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

End-to-end encryption may be the bane of cops, but they can't close that Pandora's Box https://go.theregister.com/feed/www.theregister.com/2024/05/05/e2ee_police/?utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
neurovagrant, to Cybersecurity
@neurovagrant@masto.deoan.org avatar

Just facilitated @DomainTools Neurodivergent Employee Resource Group meeting, which we've been doing now for over a year!

Really interesting dynamic today, and in addition to checking in, we talked about caffeine & stimulation, and then folks spent a while talking about raising ND kids.

If you want to know what our Neurodivergent ERG looks like: https://www.domaintools.com/resources/blog/celebrating-neurodiversity/

And @deoan and I wrote about ND strengths in infosec here: https://www.domaintools.com/resources/blog/removing-the-mask-how-neurodiversity-strengthens-cybersecurity/

neurovagrant,
@neurovagrant@masto.deoan.org avatar

Why is it important to welcome and nurture neurodiversity in cybersecurity?

I'll leave it to those touchy-feely goofs over at RAND, whose study on neurodiversity and national security found many benefits, but beyond those a necessity due to:

“missions that are too important and too difficult to be left to those who use their brains only in typical ways.”

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • InstantRegret
  • ngwrru68w68
  • Durango
  • Youngstown
  • slotface
  • mdbf
  • rosin
  • PowerRangers
  • kavyap
  • DreamBathrooms
  • normalnudes
  • vwfavf
  • hgfsjryuu7
  • cisconetworking
  • osvaldo12
  • everett
  • ethstaker
  • GTA5RPClips
  • khanakhh
  • tester
  • modclub
  • cubers
  • Leos
  • provamag3
  • All magazines