Nonya_Bidniss, to infosec
@Nonya_Bidniss@mas.to avatar

Any folks recommend the best contractor hiring in vicinity of Ft. Eisenhower? (Ft. Gordon). A friend is looking for an established contractor with good benefits hiring people at GS-13 equivalent level to staff CYBERCOM, TRADOC or other major commands.

chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

Live now on Twitch with I got a surprise in the mail | Fallout 4 | Cybersecurity and Gaming on Linux. Join in: https://twitch.tv/chiefgyk3d

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
TehPenguin, to random
@TehPenguin@hachyderm.io avatar

I've been helping to investigate a few LLVM and Rust bugs recently, and I keep running into pet peeves with how these bugs are reported, so I'm going to put together some

I don't want to discourage anyone from filing a bug, please do! But... be aware with how you represent the issue that you're seeing.

I also know that there are folks on here who are vastly more knowledgeable than I am, so feel free to suggest corrections, perhaps by filing some sort of report...

TehPenguin,
@TehPenguin@hachyderm.io avatar

If you're going to claim something is a security issue, please explain what the attacker has gained by exploiting the bug. That is, what they can now do they couldn't before.

If you can't explain what the attacker has gained, then that's not a security bug, that's just sparkling MS07-052 (https://web.archive.org/web/20100930203109/http://blogs.msdn.com/b/oldnewthing/archive/2007/08/07/4268706.aspx#4282521)

osma, to infosec
@osma@mas.to avatar

Just as we got a conviction in the case, now primary education IT has been breached and 120k students', parents' and teachers' info has been stolen.

Details are sparse, but parts of what has been revealed sound like a to me. Not confirmed though.

"Possibly the largest data breach affecting [Finland's] municipal sector"

https://yle.fi/a/74-20088448

mysk, to privacy
@mysk@mastodon.social avatar

iOS 17.5 fixes the marketplace URI bug that we showed it could result in tracking users across websites:

CVE-2024-27852

https://support.apple.com/en-us/HT214101

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
pootriarch, to infosec
@pootriarch@eldritch.cafe avatar

i have been reworking some security bits and a friend got swept up in my sand traps. he's on iOS, isn't a techie, doesn't think he's using a VPN or using special security/privacy settings — but his traffic is coming from CDN addresses (akamai, cloudflare). something's going on that i didn't know about. can anyone point me to learning links?

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
neurovagrant, to Cybersecurity
@neurovagrant@masto.deoan.org avatar

Whole lot of IDN Homoglyph Attack registrations via GoDaddy and hosted on Amazon the past few days. Examples from yesterday and today:

xn--fcbook-pta36b[.]com (fácębook[.]com)

xn--xnt-rmal15isb[.]com (xƭínïtƴ[.]com)

xn--xnt-vmag15isb[.]com (xƭînïtƴ[.]com)

xn--goole-b3b[.]com (gooǵle[.]com)

#cybersecurity #infosec #threatintel

nixCraft, to debian
@nixCraft@mastodon.social avatar

DNSCrypt-proxy is an open-source and free software designed to encrypt DNS traffic, thus protecting it from eavesdropping and manipulation. Let us see how to install DNSCrypt-proxy on a 11/12 with Adblocker or Malware blocker https://www.cyberciti.biz/faq/installing-dnscrypt-proxy-on-debian-linux/

johnleonard, to infosec
@johnleonard@mastodon.social avatar

MoD hack: IT contractor concealed major hack for months

SSCL was reportedly awarded a contract worth over £500,000 in April, despite the breach occurring weeks earlier

https://www.computing.co.uk/news/4207119/mod-hack-contractor-concealed-major-hack-months

Freyja, to infosec French
@Freyja@eldritch.cafe avatar

Solarwinds: Bonjour on vous vend une super solution de gestion d'accès

Also Solarwindws: ha oui on a hardcodé des credentials comme ça on est certains d'y avoir accès sans votre autorisation

Hacker: thanks.

https://securityonline.info/hard-coded-credentials-cve-2024-23473-rce-cve-2024-28075-flaws-patched-in-solarwinds-arm/

chiefgyk3d, to Twitch
@chiefgyk3d@social.chiefgyk3d.com avatar

Today is Mother’s Day so I took my grandmother out for lunch and having dinner with my aunt. I may be on Twitch later this evening than usual.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
mttaggart, to rust

Late-night tool release!

Introducing entropyscan-rs, a entropy scanner for analyzing files and directories during incident response. Used carefully, this can quickly identify likely malware when not all stages of an attack have been discovered, such as during a web server compromise without adequate logging. Enjoy!

github.com/mttaggart/entropyscan-rs

paul, to infosec
@paul@oldfriends.live avatar

North Korean hackers crack DMARC to spoof emails from trusted sources

North Korean state-sponsored threat actors are abusing misconfigurations in DMARC to send convincing phishing emails and gather vital intelligence from Western targets~impersonating journalists, officials have warned.

https://www.techradar.com/pro/security/north-korean-hackers-crack-dmarc-to-spoof-emails-from-trusted-sources

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

A (Strange) Interview the Russian-Military-Linked Hackers Targeting US Water Utilities https://www.wired.com/story/cyber-army-of-russia-interview/?utm_source=dlvr.it&utm_medium=mastodon

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

Microsoft developed an ‘air-gapped’ AI for spies that’s isolated from the internet https://qz.com/microsoft-offline-ai-service-chatgpt-gpt4-us-spies-1851462266?utm_source=dlvr.it&utm_medium=mastodon

andre, to sysadmin
@andre@fedi.jaenis.ch avatar

I'm trying to wrap my head around security aspects of IPv6 protocol.

From what I've learned that now my networking devices have a public IP address (unlike with IPv4 which would have to be port translated at the router).

In order to talk to a service I still will need a port next to the IP address.

Does that mean that every device in the network should have a firewall? Or can I still have one at the router level handle everything?

My fear is that a router could be easily bypassed.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • normalnudes
  • tsrsr
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • hgfsjryuu7
  • Youngstown
  • InstantRegret
  • slotface
  • everett
  • rosin
  • ngwrru68w68
  • kavyap
  • PowerRangers
  • Leos
  • ethstaker
  • GTA5RPClips
  • Durango
  • cisconetworking
  • osvaldo12
  • vwfavf
  • khanakhh
  • mdbf
  • cubers
  • modclub
  • tacticalgear
  • tester
  • anitta
  • All magazines