okla.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Oklahoma... we're trying ya'll

Administered by:

Server stats:

34
active users

#networksecurity

3 posts3 participants0 posts today
The DefendOps Diaries<p>Understanding the Cisco IOS XR Vulnerability: CVE-2025-20115</p><p><a href="https://thedefendopsdiaries.com/understanding-the-cisco-ios-xr-vulnerability-cve-2025-20115/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/unders</span><span class="invisible">tanding-the-cisco-ios-xr-vulnerability-cve-2025-20115/</span></a></p><p><a href="https://infosec.exchange/tags/cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisco</span></a><br><a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a><br><a href="https://infosec.exchange/tags/bgpvulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgpvulnerability</span></a><br><a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a><br><a href="https://infosec.exchange/tags/cyberthreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreats</span></a></p>
Corelight<p>As organizations move to multi-cloud environments, securing network traffic becomes increasingly complex. Corelight’s Open NDR offers the deep visibility needed to spot threats across both cloud-native and on-prem traffic. The real challenge isn’t just detecting threats, but understanding them in context.</p><p>In the cloud, visibility is critical for staying ahead of attackers, ensuring compliance, and maintaining a proactive security posture.</p><p>🔗 Learn how Open NDR empowers security teams to protect cloud environments with our free guide: <a href="https://go.corelight.com/a-cloud-architects-guide-to-network-security?utm_source=msdtn&amp;utm_medium=organic-social&amp;utm_campaign=ebook&amp;utm_adgroup=architect-guide&amp;utm_content=SSI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.corelight.com/a-cloud-archi</span><span class="invisible">tects-guide-to-network-security?utm_source=msdtn&amp;utm_medium=organic-social&amp;utm_campaign=ebook&amp;utm_adgroup=architect-guide&amp;utm_content=SSI</span></a></p><p><a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/NDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NDR</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/NetworkVisibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkVisibility</span></a></p>
The DefendOps Diaries<p>Addressing Critical Vulnerabilities in Ivanti Endpoint Manager</p><p><a href="https://thedefendopsdiaries.com/addressing-critical-vulnerabilities-in-ivanti-endpoint-manager/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/addres</span><span class="invisible">sing-critical-vulnerabilities-in-ivanti-endpoint-manager/</span></a></p><p><a href="https://infosec.exchange/tags/ivanti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ivanti</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilitymanagement</span></a><br><a href="https://infosec.exchange/tags/patchmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patchmanagement</span></a><br><a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a></p>
kley Sinoby<p><span class="h-card" translate="no"><a href="https://mastodon.ml/@akhil" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>akhil</span></a></span> сервисы удобная штука, у них же экосистема, почему бы если ты пользуешься большей частью сервисов не приклониться к удобному хабу в виде браузера </p><p>По поводу телеметрии, учитывая что движок хромиум, который опенсорс, значит на уровне движка можно с телеметрией без проблем поработать </p><p>По поводу самого Яндекс, проприетарное решение с надстройкой на движке, которую в теории возможно реверсить/слушать что и куда идет - могу ошибаться! <br><a href="https://infosec.exchange/tags/yandex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>yandex</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> спецы если есть подскажите </p><p>Интересная инфа имхо, что на скорую руку нагуглил:<br><a href="https://openbld.net/docs/get-started/setup-browsers/yandex/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openbld.net/docs/get-started/s</span><span class="invisible">etup-browsers/yandex/</span></a></p><p>Ну также возвращаясь к хосту, если использовать линукс, можно подогнать конфиги под себя, условно говоря если тянуть Яндекс браузер через flatpak, который работает по средству контейнеров, можно ручками корректировать то как приложение контактирует с внешним миром, да и без контейнеризации имеет место настроить файерволы под себя и все))))</p>
Corelight<p>At SCinet 2024, Eldon Koyle, Principal Technical Marketing Engineer at Corelight, was threat hunting using data from Corelight sensors in one of the fastest, most open research networks ever created.</p><p>👉 His key takeaway? Context is everything.</p><p>In high-speed environments, security teams can’t rely solely on alerts. They need data that paints a clearer picture of any suspicious behavior on the network. Enriched network logs provide critical visibility, helping threat hunters connect the dots and make more informed decisions in real time.</p><p>With vast amounts of data moving across the network, how do you ensure your security team has the visibility needed to identify and assess threats before they escalate? Read Eldon’s full insight his latest blog 🔗 <a href="https://corelight.com/blog/threat-hunting-at-scinet-24?utm_source=msdtn&amp;utm_medium=organic-social&amp;utm_campaign=blog&amp;utm_adgroup=SCinet2024&amp;utm_content=quote" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">corelight.com/blog/threat-hunt</span><span class="invisible">ing-at-scinet-24?utm_source=msdtn&amp;utm_medium=organic-social&amp;utm_campaign=blog&amp;utm_adgroup=SCinet2024&amp;utm_content=quote</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/SC24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SC24</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatHunting</span></a></p>
halil deniz<p>Aircrack-ng: A Comprehensive Guide and Cheat Sheet</p><p><a href="https://denizhalil.com/2023/12/09/aircrack-ng-comprehensive-guide/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">denizhalil.com/2023/12/09/airc</span><span class="invisible">rack-ng-comprehensive-guide/</span></a></p><p><a href="https://mastodon.social/tags/aircrackng" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aircrackng</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/wifisecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wifisecurity</span></a></p>
Corelight<p>Cloud-based AI models like DeepSeek offer convenience, but they introduce privacy concerns—especially when handling sensitive network data.</p><p>Instead, run DeepSeek locally. Learn how to use Zeek®️ and the DeepSeek-r1 model with Ollama and Open WebUI to securely and efficiently summarize Zeek package contents, without exposing your data to the cloud.</p><p>Keep your investigations in-house and benefit from: 🔐 Enhanced security—no cloud exposure ⚡️ Improved efficiency in Zeek summarization with local AI processing ⚙️ Full control and privacy when working with network monitoring scripts</p><p>Take control of your data and investigations, all while improving efficiency.</p><p>🔗 Read more on the blog: <a href="https://corelight.com/blog/secure-deepseek-zeek-analysis?utm_source=mstdn&amp;utm_medium=organic-social&amp;utm_campaign=blog&amp;utm_adgroup=deepseek&amp;utm_content=SSI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">corelight.com/blog/secure-deep</span><span class="invisible">seek-zeek-analysis?utm_source=mstdn&amp;utm_medium=organic-social&amp;utm_campaign=blog&amp;utm_adgroup=deepseek&amp;utm_content=SSI</span></a></p><p><a href="https://infosec.exchange/tags/Zeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zeek</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
P1Security<p>🚀 The countdown is on! 🚀 MWC Barcelona is almost here, and P1 Security is ready to talk all things telecom security &amp; threat intelligence.</p><p>Want to stay ahead of attackers? Let’s discuss how we can safeguard your network before threats even get a chance.</p><p>🔗 Book your meeting now: [www.p1sec.com/MWC-2025](http://www.p1sec.com/MWC-2025)</p><p>📍 Find us at:<br>📌 Hall 5 | Block 5B41 | Stand 13<br>📆 March 3-6, 2025 | Barcelona</p><p>Time’s ticking, and slots are filling up fast! See you at <a href="https://infosec.exchange/tags/MWC25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MWC25</span></a>—don’t say we didn’t warn you. ⏳</p><p><a href="https://infosec.exchange/tags/MWCBarcelona" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MWCBarcelona</span></a> <a href="https://infosec.exchange/tags/TelecomSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TelecomSecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/5G" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>5G</span></a> <a href="https://infosec.exchange/tags/MWC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MWC</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/P1Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>P1Security</span></a></p>
Securitum<p>In cybersecurity, what you don’t know can hurt you. That’s why periodic external network scanning is not just a best practice - it’s a necessity.</p><p>🚨 Why it matters:<br>External-facing assets are prime targets for attackers. Misconfigurations, unpatched services, and forgotten subdomains create entry points that adversaries actively seek. Without regular scanning, you’re essentially flying blind, unaware of the vulnerabilities that could be exploited.</p><p>🔍 What you gain:<br>✅ Identify exposed services before attackers do<br>✅ Detect shadow IT and rogue assets<br>✅ Ensure compliance with security policies<br>✅ Reduce the risk of zero-day exploitation<br>📅 How often should you scan?</p><p>While continuous monitoring is ideal, at a minimum:<br>🔹 Monthly scans for critical infrastructure<br>🔹 Quarterly assessments for broader attack surface mapping<br>🔹 Ad-hoc scans after major changes (e.g., new deployments)</p><p>⚠️But scanning alone isn’t enough❗ <br>Proper remediation and integration with vulnerability management programs are key. Findings should lead to action, not just reports.</p><p>Are you sure of your visibility of the external attack surface❓</p><p>Find out how we approach external infrastructure testing 👇</p><p><a href="https://www.securitum.com/periodic_external_network_scanning.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securitum.com/periodic_externa</span><span class="invisible">l_network_scanning.html</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/AttackSurfaceManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AttackSurfaceManagement</span></a> <a href="https://infosec.exchange/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://infosec.exchange/tags/WAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WAN</span></a></p>
Europe Says<p><a href="https://www.europesays.com/1857552/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/1857552/</span><span class="invisible"></span></a> Musk’s Starlink isn’t ready to rule Europe’s internet airwaves – POLITICO <a href="https://pubeurope.com/tags/Airlines" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Airlines</span></a> <a href="https://pubeurope.com/tags/communications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>communications</span></a> <a href="https://pubeurope.com/tags/Connectivity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Connectivity</span></a> <a href="https://pubeurope.com/tags/Data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Data</span></a> <a href="https://pubeurope.com/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://pubeurope.com/tags/England" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>England</span></a> <a href="https://pubeurope.com/tags/europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europe</span></a> <a href="https://pubeurope.com/tags/france" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>france</span></a> <a href="https://pubeurope.com/tags/Gaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gaming</span></a> <a href="https://pubeurope.com/tags/greece" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>greece</span></a> <a href="https://pubeurope.com/tags/industry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>industry</span></a> <a href="https://pubeurope.com/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> <a href="https://pubeurope.com/tags/markets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>markets</span></a> <a href="https://pubeurope.com/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/resilience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>resilience</span></a> <a href="https://pubeurope.com/tags/RobertMourik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RobertMourik</span></a> <a href="https://pubeurope.com/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://pubeurope.com/tags/satellites" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>satellites</span></a> <a href="https://pubeurope.com/tags/space" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>space</span></a> <a href="https://pubeurope.com/tags/telecoms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telecoms</span></a> <a href="https://pubeurope.com/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://pubeurope.com/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedStates</span></a></p>
Bytes Europe<p>Musk’s Starlink isn’t ready to rule Europe’s internet airwaves – POLITICO <a href="https://www.byteseu.com/757947/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/757947/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/Airlines" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Airlines</span></a> <a href="https://pubeurope.com/tags/Communications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Communications</span></a> <a href="https://pubeurope.com/tags/connectivity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>connectivity</span></a> <a href="https://pubeurope.com/tags/Data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Data</span></a> <a href="https://pubeurope.com/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://pubeurope.com/tags/England" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>England</span></a> <a href="https://pubeurope.com/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a> <a href="https://pubeurope.com/tags/France" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>France</span></a> <a href="https://pubeurope.com/tags/gaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gaming</span></a> <a href="https://pubeurope.com/tags/Greece" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Greece</span></a> <a href="https://pubeurope.com/tags/industry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>industry</span></a> <a href="https://pubeurope.com/tags/Innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Innovation</span></a> <a href="https://pubeurope.com/tags/Markets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Markets</span></a> <a href="https://pubeurope.com/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/Resilience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Resilience</span></a> <a href="https://pubeurope.com/tags/RobertMourik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RobertMourik</span></a> <a href="https://pubeurope.com/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://pubeurope.com/tags/satellites" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>satellites</span></a> <a href="https://pubeurope.com/tags/Space" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Space</span></a> <a href="https://pubeurope.com/tags/Telecoms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Telecoms</span></a> <a href="https://pubeurope.com/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://pubeurope.com/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedStates</span></a></p>
Politico.eu (Unofficial RSS)Musk’s Starlink isn’t ready to rule Europe’s internet airwaves <a href="https://www.politico.eu/article/elon-musk-starlink-not-ready-rule-europe-internet-airwave/?utm_source=RSS_Feed&amp;utm_medium=RSS&amp;utm_campaign=RSS_Syndication" rel="nofollow noopener noreferrer" target="_blank">https://www.politico.eu/article/elon-musk-starlink-not-ready-rule-europe-internet-airwave/?utm_source=RSS_Feed&amp;utm_medium=RSS&amp;utm_campaign=RSS_Syndication</a> <a class="hashtag" href="https://social.espeweb.net/tag/networksecurity" rel="nofollow noopener noreferrer" target="_blank">#Networksecurity</a> <a class="hashtag" href="https://social.espeweb.net/tag/communications" rel="nofollow noopener noreferrer" target="_blank">#Communications</a> <a class="hashtag" href="https://social.espeweb.net/tag/connectivity" rel="nofollow noopener noreferrer" target="_blank">#connectivity</a> <a class="hashtag" href="https://social.espeweb.net/tag/innovation" rel="nofollow noopener noreferrer" target="_blank">#Innovation</a> <a class="hashtag" href="https://social.espeweb.net/tag/resilience" rel="nofollow noopener noreferrer" target="_blank">#Resilience</a> <a class="hashtag" href="https://social.espeweb.net/tag/satellites" rel="nofollow noopener noreferrer" target="_blank">#Satellites</a> <a class="hashtag" href="https://social.espeweb.net/tag/technology" rel="nofollow noopener noreferrer" target="_blank">#Technology</a> <a class="hashtag" href="https://social.espeweb.net/tag/airlines" rel="nofollow noopener noreferrer" target="_blank">#Airlines</a> <a class="hashtag" href="https://social.espeweb.net/tag/industry" rel="nofollow noopener noreferrer" target="_blank">#Industry</a> <a class="hashtag" href="https://social.espeweb.net/tag/telecoms" rel="nofollow noopener noreferrer" target="_blank">#Telecoms</a> <a class="hashtag" href="https://social.espeweb.net/tag/markets" rel="nofollow noopener noreferrer" target="_blank">#Markets</a> <a class="hashtag" href="https://social.espeweb.net/tag/gaming" rel="nofollow noopener noreferrer" target="_blank">#Gaming</a> <a class="hashtag" href="https://social.espeweb.net/tag/mobile" rel="nofollow noopener noreferrer" target="_blank">#Mobile</a> <a class="hashtag" href="https://social.espeweb.net/tag/space" rel="nofollow noopener noreferrer" target="_blank">#Space</a> <a class="hashtag" href="https://social.espeweb.net/tag/data" rel="nofollow noopener noreferrer" target="_blank">#Data</a>
Pen Test Partners<p>Unauthorised network access remains a significant threat, especially for organisations lacking robust network security controls. Attackers can capture privileged credentials from automated tasks and vulnerability scanners if these tasks are configured with an excessive scope or are insufficiently protected by network or host controls...</p><p>Read our latest blog, "Watch where you point that cred," by Tom Thomas-Litman, for insights and recommendations for securing internal networks: <a href="https://www.pentestpartners.com/security-blog/watch-where-you-point-that-cred-part-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/watch-where-you-point-that-cred-part-1/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/VulnerabilityScanning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityScanning</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Honeypots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Honeypots</span></a> <a href="https://infosec.exchange/tags/LeastPrivilege" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LeastPrivilege</span></a> <a href="https://infosec.exchange/tags/RiskMitigation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RiskMitigation</span></a></p>
The Spamhaus Project<p>Every time we publish our Botnet Threat Update 🤖, the same networks show up in the Top 20 for hosting botnet C&amp;C servers. But why does this keep happening? 🤔</p><p>In this Botnet Spotlight, we look at the root causes behind this ongoing issue and what networks must do to break the cycle - learn more here 👇 <br><a href="https://www.spamhaus.org/resource-hub/botnet-c-c/networks-hosting-botnet-ccs/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/botn</span><span class="invisible">et-c-c/networks-hosting-botnet-ccs/</span></a> </p><p><a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
yawnbox :rebel:<p>does anyone happen to know if <a href="https://disobey.net/tags/F5" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>F5</span></a> offers free or heavily discounted licenses for its Virtual Edition to public charities?</p><p><a href="https://disobey.net/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://disobey.net/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://disobey.net/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://disobey.net/tags/BIGIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIGIP</span></a></p>
LavX News<p>Strengthening the Perimeter: Cybersecurity Agencies Urge Enhanced Forensic Visibility for Edge Devices</p><p>In a collaborative effort, Five Eyes cybersecurity agencies are pushing for manufacturers of network edge devices to bolster forensic capabilities, aiming to thwart escalating cyber threats. This init...</p><p><a href="https://news.lavx.hu/article/strengthening-the-perimeter-cybersecurity-agencies-urge-enhanced-forensic-visibility-for-edge-devices" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/strengthe</span><span class="invisible">ning-the-perimeter-cybersecurity-agencies-urge-enhanced-forensic-visibility-for-edge-devices</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.cloud/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.cloud/tags/EdgeComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EdgeComputing</span></a></p>
Stefan Gast<p>Announcing SnailLoad, the first fully remote website- and video-fingerprinting attack working via arbitrary TCP connections.<br>SnailLoad does not require any attacker code on the victim machine, any TCP connection is enough.</p><p>Great collaboration with Roland Czerny, Jonas Juffinger, Fabian Rauscher, <span class="h-card" translate="no"><a href="https://bird.makeup/users/silent_bits" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>silent_bits</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@lavados" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lavados</span></a></span>.</p><p>See the website for the full paper and a live demo: <a href="https://www.snailload.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">snailload.com</span><span class="invisible"></span></a><br>(1/3)</p><p><a href="https://infosec.exchange/tags/SnailLoad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SnailLoad</span></a> <a href="https://infosec.exchange/tags/sidechannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sidechannel</span></a> <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a></p>
rhaidiz 🔥<p>Ok, my turn to write an <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> full of as many hashtags as I can think of.</p><p>I am in <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> for as long as I can remember. My main interests in the subject are <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a>, <a href="https://infosec.exchange/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a>, <a href="https://infosec.exchange/tags/codereview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codereview</span></a>, and secure <a href="https://infosec.exchange/tags/systemdesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systemdesign</span></a>. Unfortunately for you (and probably for me too, I don't know at this point) I also have a Ph.D. and I am a huge fan of "The Logic of Scientific Discovery" by Karl Popper.</p><p>I also like <a href="https://infosec.exchange/tags/movies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>movies</span></a>, I watch a lot of them and I make way too many references, like the one below.</p><p>While waiting for my letter from <a href="https://infosec.exchange/tags/Hogwarts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hogwarts</span></a>, I practice my dark arts with <a href="https://infosec.exchange/tags/computerscience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computerscience</span></a> the only other thing close to magical spells that I know how to cast. 🧙</p>
Cody Dostal :unverified:<p>I decided I need to re-do my <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> post. Why? I didn't know that full-text search wasn't really a thing on Mastodon (well, particularly cross-instance), so I need to hashtag it. If you've read it before, feel free to move on, or read again. Anything goes!</p><p>I’ve seen a few others do introductory posts so I figured why not for me too. It’s unlikely I was known on <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> Twitter because I didn’t post much on Twitter. I hope to change that here. </p><p>I’ve worked in <a href="https://infosec.exchange/tags/SystemAdministration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SystemAdministration</span></a>, <a href="https://infosec.exchange/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityManagement</span></a>, <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a>, and/or <a href="https://infosec.exchange/tags/SystemofSystems" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SystemofSystems</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> for around 8 years. My experience has been solely within the world of <a href="https://infosec.exchange/tags/DOD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOD</span></a>, first as a civilian and then as a contractor. I’m currently a Senior SA/Deupty PM for Broadleaf-inc, a government contractor. </p><p>Along with that, I’ve been teaching infosec for around two years for a university. I developed many courses, Network Security, OS Security, <a href="https://infosec.exchange/tags/VulnerabilityAssessment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityAssessment</span></a> and <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenetrationTesting</span></a>, <a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a>, IDS &amp; IPS, <a href="https://infosec.exchange/tags/CyberthreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberthreatIntelligence</span></a>, as well as an Introduction to IT and a CCNA course. I’ll be developing an Advanced Penetration Testing and a Digital Forensics course this upcoming year. </p><p>I am an advocate for helping those with no existing experience and fresh graduates find positions in <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a>, truly entry level positions. I help run a discord that focuses on that, <a href="https://infosec.exchange/tags/SecurityNewbs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNewbs</span></a>, as well working on free university-style courses that people can take to learn these skills. Those aren’t ready yet, but my first free course will be Introduction to Cybersecurity. </p><p>On my off-time, I'm a huge <a href="https://infosec.exchange/tags/gamer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gamer</span></a>. You'll generally find me on the Xbox Series X, although once in a while I'll be on PS5. I generally play <a href="https://infosec.exchange/tags/destiny2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>destiny2</span></a>, probably a little too much. I have 4 kids, 5 cats, and 2 dogs. It can be a hectic house.</p><p>That’s me. Fin.</p>