Still have no idea how to get followers on #mastodon. Teach me your ways! Follow me if you like #retrogaming, #80s / #90s#nostalgia, #tech / #cyber related stuff, and #dog pics! Keep me away from Twitter, I beg of you.
Seriously, I have never played the Cyberpunk TTRPG but the computer game, as fun as it is, is basically just "poserpunk".
It is extra funny because at least a few years back a lot of Cyberpunk fans did not count Shadowrun part of the genre since it had "fantasy stuff" in it.
:HackerCatRainbow: https://cyberpunk.lol is open for registrations!!! :HackerCatRainbow:
WHO ARE WE?
we're a small scrappy relatively fresh-faced underdog instance of glitch mastodon. we have but one humbly stated mission: to put the PUNK back into cyberpunk here on the fediverse
WHO AM I?
i'm vanta. trans enby girl polyam lesbian gender terrorist, the fediverse's favorite pirate radio DJ, DIY clothing auteur, and rogue wordsmith extraordinaire. i've been a hardcore fedi user since 2017
THREADS?
not only is this instance a fedipact instance that has threads.net blocked, but... i'm the one who made the whole pact to begin with lmao
"We have incurred, and may continue to incur, certain expenses related to this (#cyber) attack, including expenses to respond to, remediate and investigate this matter," Caesars Entertainment says in its latest regulatory filing with the SEC, confirming hackers accessed driver's license numbers and possibly social security numbers, for a significant number of its loyalty club members. https://www.sec.gov/ix?doc=/Archives/edgar/data/0001590895/000119312523235015/d537840d8k.htm
"Cybersecurity, Lepassaar argues, will inevitably need to become second nature to designers and consumers.
“I do believe that we have a societal challenge ahead of us to understand digital security in the same way that we understand, security in the everyday traffic environment,” he said."
Happy Friday the 13th! We love a good dad joke, especially a spooky one 👻 . Got a funny one in mind? Share your favorite corny #cyber dad jokes in the comments below 👇
Every time I read the word #cyber, this is the kind of imagery that comes to mind. It is like someone who doesn't know what any of these words mean is spending millions of dollars to play hollywood. this is real. I didn't make this up.
I heard recently that an Australian #cyber recruiter was asking people about their childhood experiences - pulling apart computers etc - as part of a formal interview.
If you're still doing this, you're hiring for middle class and wealthy people, who were assigned male at birth, whose parents were tinkerers or wealthy, and you're skewing for neuro diversity.
There's nothing wrong with people who fit that bill. But you're angling very narrowly there.
Be mindful:
girls, and assigned female at birth people, are not encouraged to play with electronics, if they even have access to them
especially if neuro typical, girls (at least until the late 90s) will have gotten the message that it's not right - so unless they're very, very keen on tech, or very, very unconcerned about how they're perceived, they may have avoided playing with electronics even if they wanted to
poor kids don't often have access to electronics
poor parents, or those who grew up poor, tend to punish or scold children who break things, so the kids don't tend to do that if they can help themselves
you need people who grew up interested in other things too. Like how people work, and aesthetics, and logistics and all sorts of things.
Please, please, please stop pursuing only one kind of person.
Microsoft’s threat intelligence team revealed that Iranian cyberspies, identified as Peach Sandstrom, are targeting defense industrial base organizations with a new backdoor named FalseFont. This malware grants remote access to compromised systems, enables the execution of additional files, and facilitates data transmission to its command-and-control servers. The backdoor was initially detected in use against targets in early November 2023.
Mandiant, tracking the Iran-backed group as APT33, highlights their strategic cyberespionage focus on organizations in the US, Saudi Arabia, and South Korea. Their targets include commercial and military aviation companies, as well as energy sector entities linked to petrochemical production.
According to Mandiant’s alert updated in October, APT33’s activities involve malware tied to an Iranian individual, potentially working for the Iranian government to conduct cyber threats against adversaries.
Earlier research by Microsoft revealed APT33 engaging in password spraying attacks across thousands of organizations. Following successful breaches, Peach Sandstorm employed a mix of publicly available and custom tools to navigate networks, establish persistence, and move laterally within the victim’s IT systems.
Microsoft noted instances where Peach Sandstorm exfiltrated data from compromised environments, although this occurred in a limited number of intrusions.
🧶[#Thread] Interdiction des #VPN, permis #cyber pour l'entrée au collège, label objets connectés, transparence des algorithmes...
Les députés Renaissance ont déposé des dizaines d'amendements pour le projet de loi visant à sécuriser et réguler l’espace #numérique étudié la semaine prochaine.
Avons nous, en France et en français, une plate-forme éthique de divulgation de faille cyber à but non lucratif ?
Type openbugbounty ?
Si oui, laquelle ?
I'm having a few thoughts on social norms. I'm used to IRC and Usenet, where a channel or group is understood to be an open forum and, when people make a statement, it is seen as normal for anyone else, acquainted or not, to respond to it, even tangentially.
But on more social-network-style graph-based communications where the flow is determined by a follow edge between nodes or something like it, a lot of people find it disturbing or invasive to have strangers pop into their mentions to rebut, add, or jump off from their point.
I think this causes a lot of friction and expectation mismatches. I don't think either norm is wrong, though it is useful if people make it clear which one they're expecting.
For the avoidance of doubt, I'm an IRC-type person. If I'm posting public or unlisted, I do not mind strangers to disagree with me, add their own twist, or give their own reaction. I will also respect the desire of graph people who don't want me to do that to them.
Opinion | World War III Will Be Fought With Viruses - WSJ (www.wsj.com)
A two-front biological and cyber attack could lead to a U.S. defeat before we know what hit us.
US Cyber Trust Mark will boost smart home security, says White House (9to5mac.com)
The White House has announced a plan intended to improve the security of smart home tech. The government will test...