YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

Beware of adversary-in-the-middle attacks: Hackers create fake login pages to steal credentials and manipulate MFA prompts. Protect yourself by verifying websites and being cautious with links

https://thehackernews.com/2024/02/4-ways-hackers-use-social-engineering.html

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

Tools of the Trade: Anti- scanning, WAFs, and sandboxing alone aren't sufficient for protecting against malicious uploads.

https://thehackernews.com/2024/03/demystifying-common-cybersecurity-myth.html

YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar

Cybercriminals are now targeting the latest weak spot—identities within SaaS applications.

Join our webinar to learn how to secure both human and non-human identities against data breaches and financial losses.

https://thehackernews.com/2024/03/join-our-webinar-on-protecting-human.html

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

SaaS apps are everywhere, but are they secure? Mid-market companies face unique risks in managing app usage.

https://thehackernews.com/2024/03/from-500-to-5000-employees-securing-3rd.html

InfoSec4All, to Cybersecurity

🔍 Case Study Alert! Learn from the Ohio Lottery's encounter with DragonForce hackers. Transform from digital prey to a cyber-savvy guardian! Discover key strategies to shield your online presence. Stay ahead of cyber threats with our insights. #

https://wp.me/peSvjo-fE

bytephantom, to infosec
YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar

🚨 Insider Threats are a growing concern for organizations. Varonis reveals a unique approach using a data security triad.

Learn how sensitivity, access, and activity can protect your organization's most valuable assets.

https://thehackernews.com/2023/11/three-ways-varonis-helps-you-fight.html

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

Developers, beware! Malicious actors are exploiting Dependabot's trust. Learn how to restrict access, implement MFA, and secure your runtime secrets to protect your CI/CD pipelines from cyber threats.

https://thehackernews.com/2023/11/cicd-risks-protecting-your-software.html

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

Traditional cybersecurity measures might not cut it anymore!

Upgrade your defense with continuous monitoring techniques like RBVM, EASM, and Cyber Threat Intelligence.

https://thehackernews.com/2023/11/the-importance-of-continuous-security.html

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

⚠️ Don't miss this: A critical in Synology's DSM could expose your admin password! Learn how to protect your NAS device now.

https://thehackernews.com/2023/10/new-admin-takeover-vulnerability.html

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

🚨 A New Loader in Town.

An evolved version of DoubleFinger, ASMCrypt is being sold for those keen on skirting AV/EDR detection.

https://thehackernews.com/2023/09/cybercriminals-using-new-asmcrypt.html

mdolan, to opensource
@mdolan@fosstodon.org avatar

Want to sign your SBOM? Use Cosign from Sigstore to sign any blob (e.g. an SBOM):

https://docs.sigstore.dev/cosign/signing_with_blobs/

veroandi, to security
@veroandi@mastodon.social avatar
Cyberkid1987, to infosec Greek
YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

Worried about Generative-AI apps? You're not alone.

Mid-size organizations have an average of 54 Generative-AI integrations to core systems like Slack, GitHub, and Google Workspace.

https://thehackernews.com/2023/06/generative-ai-apps-chatgpt-potential.html

Cyberkid1987, to Cybersecurity Greek
mysk, to macos

🎬 Safari in 14 / 17 removes tracking added to URLs in private browsing. The feature didn't support Twitter links when we tested it earlier. Now it does (unclear if updated it remotely or Safari learned that through its model).

In this demo, Safari opens a Twitter link with tracking added to it in this parameter:
t=rpDAfXAHMthyq-L5hTMOIA

Safari identifies and removes the tracking parameter before opening the link. This is shown by copying the link after the website is loaded and pasting it to see that the tracking parameter has been removed from the original link 👍👍🙏

Cyberkid1987, to infosec Greek
Cyberkid1987, to infosec Greek
mysk, to infosec

Testing shows that if you block an iCloud account in iMessage, the account can still annoy you by sharing their location with you. Even though the account is blocked, you'll get a FindMy notification and the blocked account is immediately added to your FindMy list and you're one touch away from sharing your location with this blocked contact.
Note that the redacted text in the screenshots can be an email address tied to the sender's iCloud account. If the attacker uses an email familiar to you such as your.friendName@something, you might mistakenly share your location.
Cher Scarlett reported this issue to Apple and got the "it's not an issue" response.

https://twitter.com/cher0x801/status/1665497377032007686

Do you agree with Apple Product Security team?

FindMy notification prompting the user to share their location with a blocked account
The blocked account is immediately added to the user's FindMy list and a prompt to share location is shown.

mysk, to random

should stop apps from harvesting contact details when they have access to contacts and calendars.

This video shows the data that LinkedIn syncs when it has access to contacts and calendars. 🤯

https://youtu.be/NGIfV5ufX14

mysk, to infosec

Did you know that videos sent through Twitter regular DMs are public and not protracted by any sort of authentication? All you need is the link to the video. Twitter doesn't really show the links of videos sent through DMs, but you can easily grab the links with the help of your browser's developer tools.

Here's a link to a video from our Twitter DM, anyone can open it:

https://video.twimg.com/dm_video/1657452056930574338/pl/8zwetG4JL9UUosuUjX2yLM8hUWOFY2fSNDXavw4bo2g.m3u8?variant_version=1&tag=1&container=fmp4

And this video illustrates how you can get the link:

An illustration of how you can get the link of any video sent to your Twitter DM. Twitter is opened in Safari with developer tools toggled on. As the user receives a video in DM, the network traffic tab of the developer tools shows the link. The link is copied to the clipboard and then pasted in a new browser tab in private browsing mode. The video starts playing without any authentication.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • rosin
  • thenastyranch
  • tester
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • tacticalgear
  • Youngstown
  • ethstaker
  • osvaldo12
  • slotface
  • everett
  • kavyap
  • JUstTest
  • khanakhh
  • ngwrru68w68
  • Leos
  • modclub
  • cubers
  • cisconetworking
  • Durango
  • InstantRegret
  • GTA5RPClips
  • provamag3
  • normalnudes
  • anitta
  • lostlight
  • All magazines