appassionato, to books
@appassionato@mastodon.social avatar

Combatting Cyber Terrorism - a Guide to Understanding the Cyber Threat Landscape and Incident by Richard Bingley, 2024

This book discusses: definitions of cyber terrorism; ideologies and idealisations that can lead to cyber terrorism; how threat actors use computer systems to diversify, complicate and increase terrorist attack impacts; the role of Big Tech and social media organisations such as X (formerly Twitter) and Instagram.

@bookstodon
#books
#cybersecurity
#CyberTerrorism

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

One must select an adequate weapon, on the battleground or in . https://cromwell-intl.com/cybersecurity/crypto/cipher-strength.html?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Let none enter the fortress without proving themself worthy, for many are the rogues who would plunder the king's riches. But how to prove identity? https://cromwell-intl.com/cybersecurity/authentication.html?s=mc

chiefgyk3d, to linux
@chiefgyk3d@social.chiefgyk3d.com avatar

Discussion on Work was hell, so let's start Helldivers 2 New tools | Cybersecurity, Chilling, and Gaming on Linux live on Twitch. Hop in: https://twitch.tv/chiefgyk3d

ai6yr, (edited ) to Cybersecurity

Wow, some Arizona woman charged with setting up a "laptop farm" where North Koreans remoted into the US to work contract jobs 😬 -- with the money going to North Korea. https://apnews.com/article/north-korea-it-stolen-identity-0fb3e47dcc9a6f671b1fb7c0a722b1a8

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
seniorsguidetocomputers, to ArtificialIntelligence
@seniorsguidetocomputers@twit.social avatar
nopatience, to Cybersecurity
@nopatience@swecyb.com avatar

Is it just me or is Mastodon cyber security related activity ... a lot more quiet?

Seems people have gone back to being active on X or Threads even? No, am I imagining things?

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
mobileatom, to Symfony
@mobileatom@me.dm avatar

Today's Payload newsletter is out with the latest Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

https://newsletter.mobileatom.net/?mailpoet_router&endpoint=view_in_browser&action=view&data=WzI2LCJlODBjNDRiMDkzY2MiLDEwMywiYWMwYjRlIiwyMiwxXQ

If you like what you see please join our list or even make a small donation to help cover our fixed costs. Thanks for reading!

mobileatom, to Symfony
@mobileatom@flipboard.com avatar

Today's Payload newsletter is out with the latest Symfony, Drupal, PHP, Cybersecurity, and Fediverse news. If you like what you see please join our list or even make a small donation to help cover our fixed costs. Thanks for reading!

https://newsletter.mobileatom.net/?action=view&data=WzI2LCJlODBjNDRiMDkzY2MiLDEwMywiYWMwYjRlIiwyMiwxXQ&endpoint=view_in_browser&mailpoet_router&utm_source=flipboard&utm_medium=activitypub

Posted into SYMFONY FOR THE DEVIL @symfony

symfonystation, to random
@symfonystation@newsletter.mobileatom.net avatar

Today’s Payload newsletter is out with the latest Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.

https://newsletter.mobileatom.net/?mailpoet_router&endpoint=view_in_browser&action=view&data=WzI2LCJlODBjNDRiMDkzY2MiLDEwMywiYWMwYjRlIiwyMiwxXQ

If you like what you see please join our list or even make a small donation to help cover our fixed costs. Thanks for reading!

https://newsletter.mobileatom.net/explore-todays-the-payload-newsletter/

jsrailton, to infosec
@jsrailton@mastodon.social avatar

FINALLY: a 🇺🇸US official speaks the truth security researchers keep warning about...

Americans' movements being tracked with well-known weaknesses that US telcos aren't fixing.

It's remarkable how bad the problem with & is.

Must-read story by @josephcox
https://www.404media.co/cyber-official-speaks-out-reveals-mobile-network-attacks-in-u-s/

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

BreachForums seized! One of the world's largest hacking forums is taken down by the FBI... again.

Read more in my article on the Tripwire blog: https://www.tripwire.com/state-of-security/breachforums-seized-one-worlds-largest-hacking-forums-taken-down-fbi-again

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
symfonystation, to Symfony
@symfonystation@newsletter.mobileatom.net avatar
KimPerales, to Cybersecurity
@KimPerales@toad.social avatar

#Surveillance, telecoms are lying:

A USG cybersecurity official has broken ranks from his agency & publicly revealed that attackers have repeatedly tracked the physical location of ppl inside the US using vulnerabilities in the backbone of the world’s telecommunications cellular INFRA in recent years.

The comments from the CISA official are highly unusual in that they provide an unvarnished assessment of the threat posed by such attacks on telecom NWKs-.
#Cybersecurity

https://www.404media.co/cyber-official-speaks-out-reveals-mobile-network-attacks-in-u-s/

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

If you wish to speak to those in a remote realm, many forms of wizardry can carry your words there swifter than hawks. https://cromwell-intl.com/networking/wan-specs.html?s=mc

johnleonard, to worldnews
@johnleonard@mastodon.social avatar

Maritime security: 'Hacking a ship is just like hacking a Tesla but bigger'

Cyberattacks on shipping up 400-500% in five years, Lloyds List Intelligence

https://www.computing.co.uk/news/4208804/maritime-security-hacking-ship-hacking-tesla-bigger

davidonformosa, to thailand
@davidonformosa@mstdn.social avatar

Women and LGBTI activists in Thailand have been unlawfully targeted with digital surveillance and online harassment, including the use of Pegasus spyware, by state and non-state actors, in an effort to silence them

https://www.amnesty.org/en/latest/news/2024/05/thailand-state-backed-digital-violence-silence-women-lgbti-activists/

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

The US mom accused of using explicit deepfakes to discredit her daughter's cheerleading competitors - what's the truth? Meanwhile, learn how robocalls are stealing MFA codes from boomers.

Listen to the latest "Smashing Security" podcast now.

https://grahamcluley.com/smashing-security-podcast-372/

formidableinc, to Cybersecurity French
@formidableinc@framapiaf.org avatar

Beaucoup de gens et de thèmes intéressants

Journée de recherche sur la vie privée 2024 : découvrez le programme et inscrivez-vous gratuitement à l’évènement

Disons ... et et

https://www.cnil.fr/fr/journee-de-recherche-sur-la-vie-privee-2024-thematiques-inscriptions

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Guilds offer warrior badges. If you desire one, learn how to distinguish friend from foe. https://cromwell-intl.com/cybersecurity/isc2-cissp/domain-5-identity-access-management.html?s=mc

appassionato, to books
@appassionato@mastodon.social avatar

Hacked: The Secrets Behind Cyber Attacks by Jessica Barker, 2024

In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.

@bookstodon




  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • rosin
  • InstantRegret
  • ethstaker
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • thenastyranch
  • Youngstown
  • tacticalgear
  • slotface
  • Durango
  • khanakhh
  • kavyap
  • megavids
  • everett
  • vwfavf
  • normalnudes
  • osvaldo12
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ngwrru68w68
  • anitta
  • provamag3
  • tester
  • modclub
  • JUstTest
  • All magazines