littlesnitch, to macos German
@littlesnitch@mastodon.obdev.at avatar

Little Snitch 6 is here with powerful new features to protect your Mac’s network activity. 🔒 Upgrade now and take control!

➡️ https://obdev.at/littlesnitch

kemotep, to IT
@kemotep@mastodo.neoliber.al avatar

What’s a good appreciation gift for a team member who cracks the case? Today a network admin in our IT team caught an ancient sftp server being abused and shut it down. I’m thinking a 6 pack of craft beer.

What has your team done for people who go above and beyond in finding and stopping incidents?

wloczykij, to linux Polish

Ten post głównie zainteresuje adminów linuksowych, ale inni użytkownicy Linuksa także będą zadowoleni.

Wczoraj odkryłem ciekawy program, którego szukałem od lat :). Mowa o programie . Z wyglądu i funkcjonalności przypomina program na desktopa o nazwie .

Z opisu wynika, że obsługuje także inne platformy:

Written in - for , , *BSD, (termux) and

Ja mam odhaczone wszystkie 3 punkty z ich listy, czemu warto używać tego programu :)

  • You're debugging on a remote machine and need to study a pcap.
  • You don't want to copy it back to your desktop.
  • You're familiar with Wireshark. 😃

Poniżej link do strony:
https://termshark.io/

Co do pakietów, na ubuntu 22.04 jest dostępna wersja w repo, choć stara, bo wersja z 2021 roku.

@linux_pl





















halildeniz, to programming
@halildeniz@mastodon.social avatar

DHCP Spoofing Tool

This tool is used to spoof DHCP servers. It sends fake DHCP offers to a specific network interface and manipulates the IP addresses of network devices.

For more join our discord server:
https://discord.gg/nGBpfMHX4u

arstechnica, to random
@arstechnica@mastodon.social avatar

Microsoft’s VASA-1 can deepfake a person with one photo and one audio track

YouTube videos of 6K celebrities helped train AI model to animate photos in real time.

https://arstechnica.com/information-technology/2024/04/microsofts-vasa-1-can-deepfake-a-person-with-one-photo-and-one-audio-track/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

logickinlambda,
@logickinlambda@mastodon.social avatar

@arstechnica

I doubt it have any purpose, but expecting more scam call and misinformation with fake faces.

Please prove me wrong.

helix2301, to security

We start the show off with a bunch of Apple news talking about them having a backdoor in their phones for the last four years or more. Apple adds a new feature in iOS 17.3 called Stolen Device Protection and in iOS 17.4 Apple will allow side loading.

video/mp4

krlaboratories, to Cybersecurity Ukrainian

ДЕЩО ПРО МЕРЕЖЕВІ З'ЄДНАННЯ WHATSAPP...

Приклад того як мобільний додаток WhatsApp Messenger лізе на нестандартні (5022) і незахищені (80) мережеві порти (в ідеалі має бути лише 443).

З'єднання відбуваються з інфраструктури Facebook і серверів Amazon.

З tcp 5022 впринципі зрозуміло - це XMPP, тобто Джаббер (завдяки якому WhatsApp такий швидкий в плані миттєвого обміну повідомленнями - https://isc.sans.edu/data/port/5222). А от 80-й, незахищений порт, навіщо? Про нього в довідці щось нічого не сказано: https://developers.facebook.com/docs/whatsapp/guides/network-requirements/

Цікаво, що деякі з цих IP-адрес мають шкідливі індикатори і б'ються по VirusTotal... Де гарантія того, що через них не пролізе бекдор...? Ми, звичайно, відфільтруємо подібні з'єднання фаєрволом і зашифруємось vpn'ом. А звичайний користувач? У нього усі "брами" відкриті по дефолту...

Виявляється, в інтернеті є мапа індикаторів, які були якось пов'язані з WhatsApp: https://www.virustotal.com/graph/embed/gc884e1c5d9b84730b3b00a90f2f4a73cc145436e48ae438794e2a7dd053993a1

Ось так, ведемо слідство над WhatsApp, щоб знати що поробляє жук Цук за спиною юзера... )

Далі буде.

image/png
image/png
image/jpeg

spamhaus, to random

What do you get when you cross a truck load of clowns with internet abuse?

🤡 Clown Grade Network Address Translation a.k.a. CGNAT....

A sneaky way of hiding a bunch of devices behind a single IP, making it impossible to identify who's responsible for what! Because of this, miscreants have access to a whole pool of IPs enabling spamming and other malicious activities....... and the worst part is, many users don't even know 😨

📢 Internet service providers - learn more about this issue and what you can do to protect your users:

https://www.spamhaus.org/news/article/824/the-conundrum-that-is-the-modern-use-of-nat-at-a-carrier-grade-level

yawnbox, to macos
@yawnbox@disobey.net avatar

do you harden your ?

i made a little script to make it easy to disable various services

https://github.com/yawnbox/macos_hardening/tree/main

itnewsbot, to CloudComputing
@itnewsbot@schleuss.online avatar

The Evolution of Cybersecurity in the Age of IoT and Cloud Computing - The widespread spread of the Internet of Things (IoT) and cloud computing has beco... - https://readwrite.com/the-evolution-of-cybersecurity-in-the-age-of-iot-and-cloud-computing/ #

teriradichel, to AWS

Some Interesting IP Address and VPC Announcements from AWS
~~
How are you currently managing your IP ranges and ASNs?
~~

https://medium.com/cloud-security/some-interesting-ip-address-and-vpc-announcements-from-aws-7566beb56179

corelight, to Cybersecurity

We’ll be sharing best practices for bolstering cyber defense at MilCIS 2023 in Canberra, Australia this week! Stop by to meet with our @corelight booth F01 to learn how to use your network to reveal even the stealthiest of foreign adversaries and stop them in their tracks. https://www.milcis.com.au/about/milcis

jjx, to security

Watch my talk at on "Wi-Fi Security: When, Why, and How to Upgrade to WPA3".

Every business should be upgrading to WPA3 but it's not as easy as it sounds. Here's what you need to know!

https://youtu.be/2KCZl8FsWvc?si=MUA7Itge2U8sbNId

image/png

itnewsbot, to random
@itnewsbot@schleuss.online avatar

Splunk cuts 7% of workforce ahead of Cisco acquisition - The layoffs are happening in the wake of a market retraction, Splunk CEO Gary Steele said... - https://www.networkworld.com/article/3709848/splunk-cuts-7-of-workforce-ahead-of-cisco-acquisition.html#tk.rss_all

beatrice, to cs
@beatrice@chaosfem.tw avatar

I pulled the trigger and jumped from (yet another) instance to this one. This seems like a cozy little part of the fedi. Here is an update introduction for all you cuties 💖​

I am a #CS researcher in the midwest US. I mainly work in #NetworkSecurity and #BinaryAnalysis, particularly as they relate to critical #Infrastructure. My current project deals with re-hosting and analyzing cellular baseband processor binaries.

I also sometimes work as a contractor with a DOE lab working on critical infrastructure security.

When I can escape work, I like #diy stuff, #sustainability #Free / #Libre Software, #ElectronicMusic, #Metal, #scifi, #fantasy, #anime, and #ttrpgs. My current obsession is BattleTech and I am reading the #SailorMoon manga. When the weather cooperates I like to go inline skating.

I'm an #enby #transfem :BlobhajTransPrideHeart: and #bisexual.

I'm excited to be here and am looking forward to making some new connections around here 💖
Polynomial_C, to infosec
@Polynomial_C@mastodon.social avatar
tek_dmn, to selfhosted
@tek_dmn@mastodon.tekdmn.me avatar

Okay nerds, it's time.

I'm about to move a few parts of my network off-site. Anyone have any input for getting LDAP-based authentication to work across locations?

Like, LDAP+TLS with mutual certificate authentication is just fine, but I don't like the idea of exposing an LDAP port. Though a firewall rule to only allow the other side's IP to access it would probably be okay.

Given that this side still needs to access some internal services, it also makes sense just to it or something, that gives me everything in a manner that I believe is secure, I've yet to hear of any breaks on its encryption... just that if the remote host is compromised I have quite a wide open attack surface.

Any ideas?

Cyberkid1987, to infosec Greek
Cyberkid1987, to Cybersecurity Greek
Cyberkid1987, to infosec Greek
Cyberkid1987, to infosec Greek
mguhlin, to edutooters
@mguhlin@mastodon.education avatar

Check out a brand new Network Security course from TCEA! Learn about security tools, good practices, and avoiding attempts to trick you. https://blog.tcea.org/tcea-announces-network-security-course/ @edutooters @edtech

itnewsbot, to random
@itnewsbot@schleuss.online avatar

What is Network Security?, Definitions, Types, Tools & Attacks - Network security protects computer networks from unauthorized access, misuse, modi... - https://readwrite.com/what-is-network-security-definitions-types-tools-attacks/

ostechnix, to programming
@ostechnix@floss.social avatar

Python Network Security 2.0. #Python #Networksecurity #networking #Switch #meme

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • cisconetworking
  • DreamBathrooms
  • InstantRegret
  • ethstaker
  • magazineikmin
  • Youngstown
  • thenastyranch
  • mdbf
  • slotface
  • rosin
  • modclub
  • kavyap
  • GTA5RPClips
  • provamag3
  • osvaldo12
  • khanakhh
  • cubers
  • Durango
  • everett
  • ngwrru68w68
  • tester
  • normalnudes
  • tacticalgear
  • anitta
  • megavids
  • Leos
  • lostlight
  • All magazines