rohad, to mastodon

Still have no idea how to get followers on . Teach me your ways! Follow me if you like , / , / related stuff, and pics! Keep me away from Twitter, I beg of you.

ChristinaLekati, to infosec

🚨 BREAKING: One of the largest data breaches to date dubbed the “Mother of All Breaches,” with 26 billion leaked records — including popular sites like LinkedIn, Snapchat, Venmo, Adobe and X, formerly Twitter — in what is called the biggest leak in history.

The compromised data includes more than just login credentials while much of it is allegedly “sensitive”.

Unauthorized access to accounts and identity theft are very much a possibility: it is time to change passwords (accross platforms if there is password reuse), review/enable MFA and keep your guard up for more elaborate social engineering schemes involving personal details.

https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/

keira_reckons, to random
@keira_reckons@aus.social avatar

I heard recently that an Australian recruiter was asking people about their childhood experiences - pulling apart computers etc - as part of a formal interview.

If you're still doing this, you're hiring for middle class and wealthy people, who were assigned male at birth, whose parents were tinkerers or wealthy, and you're skewing for neuro diversity.

There's nothing wrong with people who fit that bill. But you're angling very narrowly there.

Be mindful:

  • girls, and assigned female at birth people, are not encouraged to play with electronics, if they even have access to them

  • especially if neuro typical, girls (at least until the late 90s) will have gotten the message that it's not right - so unless they're very, very keen on tech, or very, very unconcerned about how they're perceived, they may have avoided playing with electronics even if they wanted to

  • poor kids don't often have access to electronics

  • poor parents, or those who grew up poor, tend to punish or scold children who break things, so the kids don't tend to do that if they can help themselves

  • you need people who grew up interested in other things too. Like how people work, and aesthetics, and logistics and all sorts of things.

Please, please, please stop pursuing only one kind of person.

jbaert, to random
@jbaert@mastodon.social avatar

Crazy read: detecting positions of players in Counterstrike by listening to their GPU over a microphone

https://faculty.cc.gatech.edu/~genkin/papers/lendear.pdf

vz,

Wow. Start a friendly VoIP call with a target, record the audio, find patterns in their CPU activity (exploiting the fact the CPU's electro-magnetic fields are captured by the target's built-in PC microphone and can be distilled from the acoustic audio source), match the patterns against pre-trained classifier and deduce some of the target's web activity, cryptographic secrets, position within a video game. It is mind-boggling.
https://faculty.cc.gatech.edu/~genkin/papers/lendear.pdf

nono2357, to random French
0ddj0bb, to infosec

Any infosec concept videos you wish existed?

Like perhaps what dkim dmarc and spf are and how each work along with what they dont do?

Other ideas around security concepts? Can be new, old, highly technical, really high level, intro level, or advanced.

RedPacketSecurity, to OSINT
@RedPacketSecurity@mastodon.social avatar
percepticon, to Israel German
@percepticon@ioc.exchange avatar

Ein paar Beobachtungen zu den Konflikten um / sowie / . Über Hacktivismus früher und heute, die Rolle von Cyber Ops in bewaffneten Konflikten und die Frage nach den staatlichen Bedrohungsakteuren

https://background.tagesspiegel.de/cybersecurity/der-cyberkonflikt-zwischen-israel-und-der-hamas

nono2357, to France French
caseyjohnellis, to BugBounty

i’m v. proud to be in the inaugural Paul Asadoorian @paulasadoorian podcast - we talk about founding bugcrowd and disclose.io (infosec.exchange/@disclose), entrepreneurship, the role of marketing and comms in , war stories, 0-days, and ofc vuln disclosure and ;) https://www.scmagazine.com/podcast-segment/12473-hacker-heroes-casey-ellis-psw-vault

suswatibasu, to tech
@suswatibasu@mstdn.social avatar

More than two months on, British Library battles ongoing cyber-attack fallout

Almost 600 gigabytes of data were leaked online, including some personal user information.

https://howtobe247.com/british-library-battles-ongoing-cyber-attack-fallout/

emmalbriant, to ConspiracyTheories
@emmalbriant@mastodon.online avatar
Dekloo, to defi French

zcbb2 ybb22 !!!
.
Hcih2 9'2ei6d2 12 0mz2f-92yfb6b4.3f jcig gci5y6h2 ib2 zcbb2 ybb22 qoqs !

🎉 🍾












masek, to pocketknife

Blast from the past:

Do you remember the time when we were still carrying pocket knives?

This baby was the tail end of the evolution: The Victorinox Cyber Tool.

Yes, we had before it was cool 😂​.

This one was the giveaway on of our events. If I remember correctly there were less than 100 made for us.

techbites, to iran

Microsoft’s threat intelligence team revealed that Iranian cyberspies, identified as Peach Sandstrom, are targeting defense industrial base organizations with a new backdoor named FalseFont. This malware grants remote access to compromised systems, enables the execution of additional files, and facilitates data transmission to its command-and-control servers. The backdoor was initially detected in use against targets in early November 2023.

Mandiant, tracking the Iran-backed group as APT33, highlights their strategic cyberespionage focus on organizations in the US, Saudi Arabia, and South Korea. Their targets include commercial and military aviation companies, as well as energy sector entities linked to petrochemical production.

According to Mandiant’s alert updated in October, APT33’s activities involve malware tied to an Iranian individual, potentially working for the Iranian government to conduct cyber threats against adversaries.

Earlier research by Microsoft revealed APT33 engaging in password spraying attacks across thousands of organizations. Following successful breaches, Peach Sandstorm employed a mix of publicly available and custom tools to navigate networks, establish persistence, and move laterally within the victim’s IT systems.

Microsoft noted instances where Peach Sandstorm exfiltrated data from compromised environments, although this occurred in a limited number of intrusions.

Source: Microsoft’s X Posts

https://techbites.info/news/cybersecurity/microsoft-warns-of-iranian-cyberspies-using-falsefont-backdoor/

#cyber #iran #microsoft #security #tech

nono2357, to random French
popitter_net, to random

Noch schnell ein Weihnachtsgeschenk klicken?
Der @digitaldruide hat feinstes !

https://digitaldrui.de/

rye, to hacking
@rye@ioc.exchange avatar

I explain critical considerations surrounding the detection and response strategies that organizations must adopt to fortify their digital landscapes

https://youtu.be/59PCohZi1Ts

cybercareersblog, to Cybersecurity
Lyrilith, to art
@Lyrilith@pixelfed.social avatar

Finally got around to drawing Dan from "Drugs and Wires", an awesome web comic by @cryodraws and Io Black. (Go read it at https://drugsandwires.fail/ !!!)
Just a quick drawing I did yesterday and decided it needed moar cyber, so I edited it a bit in GIMP.

cybercareersblog, to Cybersecurity
cybercareersblog, to Cybersecurity
nono2357, to random French
cybercareersblog, to Cybersecurity
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • cisconetworking
  • thenastyranch
  • GTA5RPClips
  • everett
  • Durango
  • rosin
  • InstantRegret
  • DreamBathrooms
  • magazineikmin
  • Youngstown
  • mdbf
  • slotface
  • ethstaker
  • megavids
  • kavyap
  • normalnudes
  • modclub
  • cubers
  • ngwrru68w68
  • khanakhh
  • tacticalgear
  • tester
  • provamag3
  • Leos
  • osvaldo12
  • anitta
  • lostlight
  • All magazines