jamie, to IT
@jamie@boothcomputing.social avatar

I never did an .

I'm an guy who likes to tinker with stuff. I was in Identity in an -adjacent role with a lot of stress. Recently moved to an role which makes me much happier.

I've been married to @MollyBooth for more than 10 years and we have an 8yr old son.

I love all things baseball and am a huge fan.

I drive an and am happy to talk about that topic as well.

My hobbies are , , , and .

emc2, to infosec
cybercareersblog, to infosec

DOJ Detected SolarWinds Breach Months Before Public Disclosure | WIRED
https://www.wired.com/story/solarwinds-hack-public-disclosure/

PogoWasRight, to infosec
mysk, to infosec

Many iOS users report losing their 2FA codes after updating their Google Authenticator app. Meanwhile, Android users took to Google Play reviews to complain about the lack of end-to-end encryption.

A screenshot of the Google Play Store app showing multiple one-star reviews of Google Authenticator users disappointed that the app does not use end-to-end encryption when syncing 2FA codes to Google Cloud.

avolha, to infosec

🇬🇧 Group-IB, one of Russia's largest cybersecurity firms, says it's fully exited Russia. "The stand-alone Russian business has been sold to local management and will be operating under the new brand F.A.C.C.T. Group-IB’s branding and trademarks will cease to be in operation in Russia by the end of 2023."

🇵🇱 Group-IB, jedna z największych rosyjskich firm zajmujących się cyberbezpieczeństwem, twierdzi, że całkowicie opuściła Rosję. "Samodzielny rosyjski biznes został sprzedany lokalnemu zarządowi i będzie działał pod nową marką F.A.C.C.T. Branding i znaki towarowe Group-IB przestaną obowiązywać w Rosji do końca 2023 r."

https://www.group-ib.com/media-center/press-releases/group-ib-exits-russia/

avolha, to infosec Polish

Programujecie w Pythonie? Podczas marcowej edycji PyStoku można było obejrzeć prelekcję o popularnych ostatnio atakach na pakiety w PyPI - na co konkretnie polują przestępcy i jak się przed nimi chronić

https://yewtu.be/watch?v=qcRLEtln-ZY

@mateuszchrobok

ligniform, to infosec

Time for an because I've been putting it off for so long.

I'm an ex who got burned out and decided to pivot to something else. I've set my sights on and its been an amazing journey so far!
and have always interested me and I don't know why it took me so long to focus on it 🤷​

Aside from infosec I'm also into (Bookwyrm reveal coming soon?) And

Think thats all for now, fuck fascists and have a good day friends 💜​

jkirk, to infosec

Great profile of Australia's @asherwolf whose digital rights activism from the Wikileaks-era onwards has raised awareness about everything from the robo-debt scandal to the need for greater government transparency.
https://www.smh.com.au/national/who-is-the-person-behind-the-handle-asher-wolf-20230425-p5d31z.html

chort, to random

deleted_by_author

  • Loading...
  • wendynather,

    @chort @thegrugq @tomatospy Agreed. Expertise is the combination of knowledge, skills and experience. Which is why training isn’t enough. You have to experience many different situations in .

    selenalarson, to random
    @selenalarson@mastodon.social avatar

    Y’all I can’t tell you how excited I am for the upcoming conference!! We got a banger of a presentation + report for you.

    Movie GIF

    0x58,

    @selenalarson Why nobody's told me I was missing it from my list! Mistake corrected now! Thanks for sharing :)

    https://github.com/xsa/infosec-events

    malanalysis, to infosec

    Reminder that if you are ever looking for for an or cert, the free Incident Command Training from FEMA (NIMS) is almost always applicable for CPEs since digital incident response still counts.

    https://training.fema.gov/nims/

    abrignoni, to infosec
    VidmoOreda, to infosec

    Let's do a Twitter era thing, especially in the community but not limited to...: Follow Friday! These people are a great follow. Whether it's content, opinions, and/or professional acumen, but friendship, comradery, and/or kindness. aaaaannnnnd.

    @MrsMouse @mttaggart @EDVARDS @SecureInStyle @signalblur @ThatOhGi @Ecmadtown @frwessling @damien @cybeej @Blenster @cyberpanda @jkbecker @Pits @shiftygeek @jamesthebard @andraste @koalafiedhacker @BetoOnSecurity @Ladyred_6 @krypt3ia

    PogoWasRight, to infosec

    Hardenhuish School, a mixed secondary academy in Chippenham, UK, sent texts to parents and guardians of its 1,623 pupils notifying them of a ransomware attack. The identity of the ransomware group has not been revealed as yet.

    https://www.computing.co.uk/news/4113037/uk-school-hit-ransomware-attack

    @brett @douglevin

    avolha, to infosec Polish

    Nowa rozmowa z cyklu "Rewolucja AI", który prowadzą @mateuszchrobok i Tomasz Rożek z "Nauka. To lubię" - tym razem o zagrożeniach (obecnych i potencjalnych) związanych ze sztuczną inteligencją

    https://yewtu.be/watch?v=n3qSjQz4Upw

    blitz, to infosec

    I can't think of the the appropriate snarky comment. I feel reminded of @HalvarFlake
    mentioning in a talk that the one thing that helps with security is to limit/control complexity.

    rmaloley, to infosec

    So, uh, we all agree that encryption is good right? Even at rest data should be encrypted? Cool? OK.

    beny23, to infosec

    Sensible advice from - headache all over…

    dantemercurio, to infosec
    @dantemercurio@ioc.exchange avatar

    Appears that Aspen Dental is a victim of a cyberattack. Not much known other than multiple business applications were affected and at least one user on Reddit is stating patient services are affected as well. Could only find one news article on this so far. No details but definitely seems to be following the standard ransomware attack path.

    https://www.fox13news.com/news/aspen-dental-becomes-latest-healthcare-provider-victimized-by-hackers

    emc2, to random

    I am slowly realizing the magnitude of my error in allowing myself to be associated with zero trust...

    emc2,

    Just because I co-wrote a tech report critiquing a ZT roadmap (harshly, I might add) doesn't mean I want to spend an hour listening to you talk about your spreadsheet.

    RTP, to opensource
    @RTP@fosstodon.org avatar
    Kirkman, to infosec
    @Kirkman@mastodon.social avatar

    The Post-Dispatch recently found that Missouri's Case.net website exposes the private information of thousands of people.

    The courts patched one technical vulnerability after being alerted by the newspaper.

    Thousands more records with unredacted sensitive information remain publicly accessible, though, because they are considered open records.

    https://stltoday.com/news/local/crime-and-courts/court-records-online-include-private-information-for-thousands-of-missouri-residents/article_f5b23bce-e44c-11ed-a554-33728de7a460.html

    hazel, to infosec

    Are there any good sources that track recent breaches and compromised websites? A blog format is ideal but I'm interested in anything online. Reddit and Twitter used to be great sources but both have become pretty useless for this.

    emory, to infosec
    @emory@soc.kvet.ch avatar

    this sounds like a that i want nothing to do with.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • khanakhh
  • kavyap
  • thenastyranch
  • everett
  • tacticalgear
  • rosin
  • Durango
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • InstantRegret
  • Youngstown
  • slotface
  • JUstTest
  • ethstaker
  • ngwrru68w68
  • cisconetworking
  • modclub
  • tester
  • osvaldo12
  • cubers
  • GTA5RPClips
  • normalnudes
  • Leos
  • provamag3
  • anitta
  • lostlight
  • All magazines