David_Hollingworth, to Cybersecurity
@David_Hollingworth@mastodon.social avatar

One year on and the OIAC is still quiet on its investigation into last year's Latitude data breach - and the lawyers working on a class action case are not very happy about it.

https://www.cyberdaily.au/government/10546-lawyers-express-frustration-over-year-old-oaic-investigation-into-latitude-hack

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Unscrupulous merchants claim that their devices let you speak secretly. Be skeptical in the bazaar. https://cromwell-intl.com/cybersecurity/descrambler.html?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

A wise warrior learns to recognize his foes. Hot-headed knaves simply repeat their own fighting moves over and over. https://cromwell-intl.com/cybersecurity/attack-study/?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

$10 million reward offer for apprehension of unmasked LockBit ransomware leader.

Read more in my article on the Exponential-e blog: https://www.exponential-e.com/blog/10-million-reward-offer-for-apprehension-of-unmasked-lockbit-ransomware-leader

mobileatom, to Symfony
@mobileatom@me.dm avatar

Explore this week's edition of The Payload. It has the latest developments in the Symfony, Drupal, PHP, Cybersecurity, and Fediverse communities. https://newsletter.mobileatom.net/?mailpoet_router&endpoint=view_in_browser&action=view&data=WzI1LCIzMjhiMjNmZGE1NjQiLDEwMywiYWMwYjRlIiwyMSwxXQ

mobileatom, to Symfony
@mobileatom@flipboard.com avatar

The Payload May 9, 2024 Explore this week's edition of The Payload, which features the latest developments in the Symfony, Drupal, PHP, Cybersecurity, and Fediverse communities.

https://newsletter.mobileatom.net/?action=view&data=WzI1LCIzMjhiMjNmZGE1NjQiLDEwMywiYWMwYjRlIiwyMSwxXQ&endpoint=view_in_browser&mailpoet_router&utm_source=flipboard&utm_medium=activitypub

Posted into SYMFONY FOR THE DEVIL @symfony

symfonystation, to Symfony
@symfonystation@newsletter.mobileatom.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

The acolytes groan as the priests begin drawing. 'Tis not a dread and baleful grimoire, but a diagram they've grown weary of. Yet the priests insist that it brings enlightenment. https://cromwell-intl.com/networking/osi.html?s=mc

chiefgyk3d, to python
@chiefgyk3d@social.chiefgyk3d.com avatar

I was up late trying to figure out a stupid issue I was having with the Crowdstrike API so I didn't stream on twitch last night, hoping to do a stream tonight. I think they took a feature out my team was actually using which would allow me to contain a device and make a note that could be viewed in the dashboard.

#Coding #Crowdstrike #Python #Dev #InfoSec #Cybersecurity

symfonystation, to Symfony
@symfonystation@newsletter.mobileatom.net avatar
gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Cancer patients' sensitive information accessed by "unidentified parties" after being left exposed by screening lab for years.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/cancer-patients-sensitive-information-accessed-by-unidentified-parties-after-being-left-exposed-by-screening-lab-for-years/

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Sometimes the very machines of computation are but ephemeral devices conjured by wizards. https://cromwell-intl.com/cybersecurity/virtualization.html?s=mc

kubikpixel, to opensource
@kubikpixel@chaos.social avatar

Is this a propaganda article to present closed-source software as more secure or is it to sell IT "security"?

»Open-Source Cybersecurity Is a Ticking Time Bomb:
A vast majority of the world's software runs on open-source code. Can it be secured?«

🔓 https://gizmodo.com/open-source-cybersecurity-is-a-ticking-time-bomb-1848790421


conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Guilds offer warrior badges. If you desire one, learn how to operate a thriving caravanserai. https://cromwell-intl.com/cybersecurity/isc2-ccsp/operations.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

The guild only gives badges to a warrior who understands risk management, but the training can be arduous. https://cromwell-intl.com/cybersecurity/comptia/domain-5-answers.html?s=mc

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
David_Hollingworth, to Cybersecurity
@David_Hollingworth@mastodon.social avatar
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Become a warrior. There is much here to learn. https://cromwell-intl.com/cybersecurity/?s=mc

ianonymous3000, to Cybersecurity
@ianonymous3000@mastodon.social avatar

📚 Just completed the 'Basics of Personal Threat Modeling' course by @privacyguides 🛡️

Threat modeling is crucial because it helps identify and prioritize the most probable security and privacy risks. It enables focused resource allocation, tailored defenses, and heightened awareness.

Check it out: https://learn.privacyguides.org

image/png

infobeautiful, to random
@infobeautiful@vis.social avatar
aeveltstra,
@aeveltstra@mastodon.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • mdbf
  • magazineikmin
  • InstantRegret
  • hgfsjryuu7
  • Durango
  • Youngstown
  • slotface
  • everett
  • thenastyranch
  • rosin
  • kavyap
  • khanakhh
  • PowerRangers
  • Leos
  • DreamBathrooms
  • vwfavf
  • ethstaker
  • tacticalgear
  • cubers
  • ngwrru68w68
  • modclub
  • cisconetworking
  • osvaldo12
  • GTA5RPClips
  • normalnudes
  • tester
  • provamag3
  • All magazines