andre, to sysadmin
@andre@fedi.jaenis.ch avatar

I'm trying to wrap my head around security aspects of IPv6 protocol.

From what I've learned that now my networking devices have a public IP address (unlike with IPv4 which would have to be port translated at the router).

In order to talk to a service I still will need a port next to the IP address.

Does that mean that every device in the network should have a firewall? Or can I still have one at the router level handle everything?

My fear is that a router could be easily bypassed.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

UK Ministry of Defence Suffers Major Data Breach, China’s Involvement Suspected https://thecyberexpress.com/uk-ministry-of-defence-data-breach/?utm_source=dlvr.it&utm_medium=mastodon

tech, to tech
@tech@unfufadoo.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
cigitalgem, to ai
@cigitalgem@sigmoid.social avatar

CalypsoAI produced a video for RSA abojut #MLsec #AI #ML #security #infosec #LLM

Watch as I interview Jim Routh and Neil Serebryany.

https://berryvilleiml.com/2024/05/10/video-interview-a-deep-dive-into-generative-ai-and-cybersecurity/

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
chiefgyk3d, to python
@chiefgyk3d@social.chiefgyk3d.com avatar

I was up late trying to figure out a stupid issue I was having with the Crowdstrike API so I didn't stream on twitch last night, hoping to do a stream tonight. I think they took a feature out my team was actually using which would allow me to contain a device and make a note that could be viewed in the dashboard.

#Coding #Crowdstrike #Python #Dev #InfoSec #Cybersecurity

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
north, to Cybersecurity
@north@xn--8r9a.com avatar

I'll give this a shot.

I'm looking to for a role in . I've done both offensive (see e.g. https://github.com/qwell/disclosures/) and defensive security work, and have over 20 years of software development experience in many different languages.

ISC2 CC

DMs always open.

(we should pick a hashtag and stick with it)

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
Morishima, to security
@Morishima@ieji.de avatar

It has been pointed out that Vivaldi's "Speed Dials" feature with no ads or affiliate listings is problematic.
Any plans for improvement, @Vivaldi?

Details: https://nitter.poast.org/Yuki27183/status/1787955010837561361#m

michael, to infosec
@michael@thms.uk avatar

Seriously Apple? Seriously? and then we are surprised people fall for phishing scams despite 2FA 🤦‍♂️

#infosec #Apple #fail #2fa

johnleonard, to privacy
@johnleonard@mastodon.social avatar

'TunnelVision' bug potentially allows snooping on all VPNs

Operating system features can be manipulated to divert traffic away from encrypted VPN tunnel

https://www.computing.co.uk/news/4205875/tunnelvision-bug-potentially-allows-snooping-vpns

michael, to infosec
@michael@thms.uk avatar

Remember guys: hosting in the cloud doesn’t mean you don’t need backups: always have backups that are stored with an independent third party!

https://www.datacenterdynamics.com/en/news/unisuper-private-cloud-outage-caused-by-google-cloud-issues/

tech, to tech
@tech@unfufadoo.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

End-to-end encryption may be the bane of cops, but they can't close that Pandora's Box https://go.theregister.com/feed/www.theregister.com/2024/05/05/e2ee_police/?utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
neurovagrant, to Cybersecurity
@neurovagrant@masto.deoan.org avatar

Just facilitated @DomainTools Neurodivergent Employee Resource Group meeting, which we've been doing now for over a year!

Really interesting dynamic today, and in addition to checking in, we talked about caffeine & stimulation, and then folks spent a while talking about raising ND kids.

If you want to know what our Neurodivergent ERG looks like: https://www.domaintools.com/resources/blog/celebrating-neurodiversity/

And @deoan and I wrote about ND strengths in infosec here: https://www.domaintools.com/resources/blog/removing-the-mask-how-neurodiversity-strengthens-cybersecurity/

neurovagrant,
@neurovagrant@masto.deoan.org avatar

Why is it important to welcome and nurture neurodiversity in cybersecurity?

I'll leave it to those touchy-feely goofs over at RAND, whose study on neurodiversity and national security found many benefits, but beyond those a necessity due to:

“missions that are too important and too difficult to be left to those who use their brains only in typical ways.”

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • InstantRegret
  • ngwrru68w68
  • Durango
  • Youngstown
  • slotface
  • mdbf
  • rosin
  • PowerRangers
  • kavyap
  • DreamBathrooms
  • normalnudes
  • vwfavf
  • hgfsjryuu7
  • cisconetworking
  • osvaldo12
  • everett
  • ethstaker
  • GTA5RPClips
  • khanakhh
  • tester
  • modclub
  • cubers
  • Leos
  • provamag3
  • All magazines