okla.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Oklahoma... we're trying ya'll

Administered by:

Server stats:

33
active users

#cloudsecurity

15 posts13 participants1 post today
0x40k<p>Hey everyone, does this sound familiar? You install a Python package and suddenly feel like you've been robbed blind? 😂</p><p>Right now, there's a nasty campaign going on targeting PyPI, and it's misusing "time" utilities to swipe cloud credentials. Get this – it's already had over 14,000 downloads! The malware hides in packages that are *supposed* to just check the time. But instead, they're snatching cloud keys (AWS, Azure, the works) and sending them straight to the bad guys.</p><p>Honestly, it reminds me of a pentest we did where we *almost* missed a similar camouflage trick. Seriously creepy! So, heads up: Double-check your dependencies, run those scans, review your cloud configurations, and above all, be suspicious! And hey, just a friendly reminder: automated scans are no substitute for a manual pentest!</p><p>Have you run into anything similar? What tools are you using to beef up your security? Let's chat about it!</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://infosec.exchange/tags/pypi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pypi</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p>
Corelight<p>As organizations move to multi-cloud environments, securing network traffic becomes increasingly complex. Corelight’s Open NDR offers the deep visibility needed to spot threats across both cloud-native and on-prem traffic. The real challenge isn’t just detecting threats, but understanding them in context.</p><p>In the cloud, visibility is critical for staying ahead of attackers, ensuring compliance, and maintaining a proactive security posture.</p><p>🔗 Learn how Open NDR empowers security teams to protect cloud environments with our free guide: <a href="https://go.corelight.com/a-cloud-architects-guide-to-network-security?utm_source=msdtn&amp;utm_medium=organic-social&amp;utm_campaign=ebook&amp;utm_adgroup=architect-guide&amp;utm_content=SSI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.corelight.com/a-cloud-archi</span><span class="invisible">tects-guide-to-network-security?utm_source=msdtn&amp;utm_medium=organic-social&amp;utm_campaign=ebook&amp;utm_adgroup=architect-guide&amp;utm_content=SSI</span></a></p><p><a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/NDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NDR</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/NetworkVisibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkVisibility</span></a></p>
Kyler Middleton<p>AWS Anti-Patterns: A Security Superpower?</p><p>I had the pleasure of contributing to the Cloud Security Newsletter with an interview exploring why AWS anti-patterns around Network Firewall - yes, the things we’re told not to do, and how they might actually be the key to strengthening your cloud security posture. 🚀</p><p>Curious how? Check it out here:</p><p>Link to the newsletter: <a href="https://www.cloudsecuritynewsletter.com/p/why-aws-anti-patterns-might-be-your-next-cloud-security-superpower" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cloudsecuritynewsletter.com/p/</span><span class="invisible">why-aws-anti-patterns-might-be-your-next-cloud-security-superpower</span></a> </p><p><a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/LetsDoDevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LetsDoDevOps</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>SpiderFoot is an open-source OSINT tool to automate data collection about targets. It supports over 200 modules, integrating DNS, IP, email, and infrastructure analysis. Perfect for security audits or threat intel workflows. <a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/smicallef/spiderfoot" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/smicallef/spiderfoot</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Sqlmap is an open-source tool for automating SQL injection detection and exploitation. It supports multiple databases like MySQL, PostgreSQL, Oracle, and more. Widely used for penetration testing, it includes features like database dumping, password cracking, and file system access. </p><p>Remember: powerful tools require responsible use. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/sqlmapproject/sqlmap" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/sqlmapproject/sqlmap</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
G :donor: :Tick:<p>I’m delighted to have attended the Offensive Entra ID And Hybrid AD Security workshop by Dirk-jan Mollema of Outsider Security at <a href="https://infosec.exchange/tags/Insomnihack2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Insomnihack2025</span></a> sponsored by Orange Cyberdefense! It was a truly insightful and engaging workshop where I learned (in some cases relearned) how <a href="https://infosec.exchange/tags/MicrosoftEntra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftEntra</span></a> *REALLY* works under the covers and how you can abuse the authentication flows (and therefore how you can better defend your Entra tenant and the services that it underpins)!</p><p>I would thoroughly recommend anyone working in Cloud Security who works with Azure/M365 (and therefore Entra) from a security perspective goes on this workshop when it is next run publicly or indeed engage with Outsider Security to run it internally for you. <a href="https://infosec.exchange/tags/INS2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>INS2025</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/ThinkLikeAnAttacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThinkLikeAnAttacker</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Nuclei is a tool for automating vulnerability scanning using customizable YAML-based templates. Its strength lies in speed and flexibility, making it ideal for penetration testers and security researchers. Think of it as crafting your own scanner that adapts to your needs. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/VulnerabilityTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityTesting</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/projectdiscovery/nuclei" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/projectdiscovery/nu</span><span class="invisible">clei</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
0x40k<p>Seriously, backups... still such a headache, right? 🤯 Just stumbled across some stats that suggest a ton of companies are WAY overconfident about their recovery readiness. Seriously, WTF?!</p><p>Yeah, the cloud's great and all, but let's be real – if you don't have a Plan B (and C, D...), you're toast. Sorry, not sorry, for being blunt. 🙈</p><p>As a pentester, I see this all the time: Backups are there, sure, BUT... they've never actually been tested. Or they're secured with super old, outdated credentials. Hello, ransomware! 👹</p><p>Here's my two cents: Backups HAVE to be an integral part of your security strategy, not just some afterthought. We're talking regular testing, preferably automated. And those cloud backups? You've gotta double-check those access permissions! Shadow IT is a HUGE risk! ⚠️</p><p>What do you guys think? Are backups just a pain in the butt compliance thing, or are they more like a vital insurance policy? 🤔</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/backup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backup</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
0x40k<p>Alright folks, gotta share something kinda alarming I just read: SSRF attacks are seriously picking up steam! 🤯 For those who don't know, SSRF (Server Side Request Forgery) is nasty business. Basically, attackers can trick your server into making requests *for* them. Think internal network snooping, stealing cloud credentials... you know the drill.</p><p>And get this – it's hitting tons of systems at once (DotNetNuke, Zimbra, VMware, GitLab, Ivanti, you name it!). It almost feels like a coordinated attack, doesn't it?</p><p>It's especially dicey in the cloud because SSRF can be used to access internal metadata APIs. Yikes!</p><p>I'm telling you, I once did a pentest where we almost completely missed an SSRF vulnerability being used to compromise internal AWS resources. It was a super close call! 😅</p><p>So, here's what you should do, pronto:</p><p>* **Patch like your life depends on it!** (Seriously, this isn't optional)<br>* **Restrict outgoing connections** (Least Privilege is your best friend here!)<br>* **Monitor those outgoing requests** (Gotta catch any suspicious behavior)<br>* **Network segmentation** (This can seriously limit the damage)</p><p>AI can be helpful for spotting anomalies, but remember: AI is NOT a pentest! Automated scans are nice, but they're no replacement for actual human expertise.</p><p>Are you seeing more SSRF attacks lately? What tools are you using to detect them? Let me know in the comments.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/ssrf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssrf</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Mimikatz is a well-known open-source tool for extracting credentials from Windows systems. It can retrieve plaintext passwords, hash credentials, and even Kerberos tickets from memory. Used by both researchers and attackers, it highlights the importance of secure credential management in Active Directory environments. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/gentilkiwi/mimikatz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/gentilkiwi/mimikatz</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Merill Fernando :verified: :donor:<p>🎙️ BIG NEWS: I'm launching Entra.Chat - the podcast identity pros have been waiting for!</p><p>After years in the identity trenches, I've seen a lot - the midnight calls, the authentication puzzles, and those "how is this even possible?" moments.</p><p>That's why I created EntraChat - to share the REAL stories behind Microsoft Entra deployments that you won't find in documentation.</p><p>My first episode drops TODAY with identity wizard Ben Wolfe, who reveals how his team migrated 700 apps and 30,000 users from Okta to Microsoft Entra in just 90 days (while implementing Windows Hello for Business simultaneously!)</p><p>I've already recorded amazing conversations with identity leaders who've solved problems you're probably facing right now. Their candid insights and battle-tested solutions might just save your next deployment!</p><p>Upcoming episodes include conversations with<br>❤️ Kuba Gretzky - Creator of EvilGinx<br>❤️ Martin Sandren - Product leader at Ikea<br>❤️ Dhanyah Krishnamoorthy - Product Manager, Microsoft Entra for Connect Sync and Cloud Sync<br>❤️ Samantha 🦚 Kloos-Kilkens - <br>❤️ Nathan McNulty - Fountain of knowledge on all things Microsoft Security</p><p>Who's ready to level up their identity knowledge?</p><p>Drop a 💙 if you're as excited about this as I am!</p><p>Subscribe with your favourite podcast player:<br>🎧 Apple Podcast - <a href="https://podcasts.apple.com/us/podcast/entra-chat/id1801200012" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">podcasts.apple.com/us/podcast/</span><span class="invisible">entra-chat/id1801200012</span></a></p><p>🎧 Spotify - <a href="https://open.spotify.com/show/2lJSWBTmMWWn4f9u75JvHY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.spotify.com/show/2lJSWBTm</span><span class="invisible">MWWn4f9u75JvHY</span></a></p><p>📺 YouTube - <a href="https://www.youtube.com/@merillx/podcasts" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/@merillx/podcasts</span><span class="invisible"></span></a></p><p>🎧 Pocketcast - <a href="https://pca.st/10oii6uv" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pca.st/10oii6uv</span><span class="invisible"></span></a></p><p>🎧 Overcast - <a href="https://overcast.fm/itunes1801200012" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">overcast.fm/itunes1801200012</span><span class="invisible"></span></a></p><p>🎧 Other podcast apps (rss) - <a href="https://api.substack.com/feed/podcast/1804560/private/17af4edf-5946-4494-a05a-ac8693ba426d.rss" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">api.substack.com/feed/podcast/</span><span class="invisible">1804560/private/17af4edf-5946-4494-a05a-ac8693ba426d.rss</span></a></p><p>Episode 1: <a href="https://entra.news/p/from-okta-to-entra-migrating-700" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">entra.news/p/from-okta-to-entr</span><span class="invisible">a-migrating-700</span></a></p><p><a href="https://infosec.exchange/tags/MicrosoftEntra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftEntra</span></a> <a href="https://infosec.exchange/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IdentityManagement</span></a> <a href="https://infosec.exchange/tags/TechPodcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechPodcast</span></a> <a href="https://infosec.exchange/tags/AzureAD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AzureAD</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Bettercap is a powerful, modular tool for network attacks and monitoring. It supports ARP spoofing, DNS spoofing, packet sniffing, and more. Written in Go, it's flexible and efficient for intercepting and manipulating network traffic on various protocols. <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> 👉 <a href="https://github.com/bettercap/bettercap" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/bettercap/bettercap</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
The DefendOps Diaries<p>Google's Enhanced Vulnerability Reward Program: A 2024 Milestone</p><p><a href="https://thedefendopsdiaries.com/googles-enhanced-vulnerability-reward-program-a-2024-milestone/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/google</span><span class="invisible">s-enhanced-vulnerability-reward-program-a-2024-milestone/</span></a></p><p><a href="https://infosec.exchange/tags/googlevrp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googlevrp</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a><br><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a><br><a href="https://infosec.exchange/tags/infosectrends" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosectrends</span></a></p>
The DefendOps Diaries<p>Google’s Bug Bounty Program: A Deep Dive into 2024's Transformative Payouts</p><p><a href="https://thedefendopsdiaries.com/googles-bug-bounty-program-a-deep-dive-into-2024s-transformative-payouts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/google</span><span class="invisible">s-bug-bounty-program-a-deep-dive-into-2024s-transformative-payouts/</span></a></p><p><a href="https://infosec.exchange/tags/googlebugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googlebugbounty</span></a><br><a href="https://infosec.exchange/tags/cybersecurity2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity2024</span></a><br><a href="https://infosec.exchange/tags/vulnerabilityrewards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilityrewards</span></a><br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a><br><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p>
Jay Thoden van Velzen ☁️​🛡️​:lolsob:<p>with everybody freaking out about TrumpMusk and what that means for our digital sovereignty, here's a little "don't panic, please"</p><p>Europe is not as much of a powerless victim in this as it may seem</p><p><a href="https://infosec.press/jaythvv/19" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">infosec.press/jaythvv/19</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/digitalsovereignty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalsovereignty</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/sovereigncloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sovereigncloud</span></a></p>
paul<p>The Netskope <a href="https://infosec.exchange/tags/Threat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Threat</span></a> Labs Report <a href="https://infosec.exchange/tags/Financial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Financial</span></a> Services 2025 is out!</p><p>⛈️ 4.7 out of 1000 users click on <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> links monthly<br>⛈️ 40% of phishing targets <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> applications<br>⛈️ 20% of <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> downloads come from <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> <br>⛈️ 95% of organizations use <a href="https://infosec.exchange/tags/genAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genAI</span></a>, with an average of 10 applications</p><p><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a> </p><p><a href="https://www.netskope.com/resources/threat-labs-reports/threat-labs-report-financial-services-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">netskope.com/resources/threat-</span><span class="invisible">labs-reports/threat-labs-report-financial-services-2025</span></a></p>
0x40k<p>Just stumbled across a stat that blew my mind: apparently, 80% of all cyberattacks happen because someone got their hands on stolen login credentials. Crazy, right? It's like identity is the new battleground out there! And honestly, a lot of companies just don't have a handle on it. I'm seeing fragmented IT setups and permissions all over the place, and that's where the real issues begin.</p><p>So, what's the answer? Centralizing your identity management, that's what! This will give you a clearer view, let you respond to attacks faster, and automate security measures. Now, Cloud Security? It's way more than just a buzzword. I see it time and time again in my pentests, how easily attackers waltz into systems through unprotected identities. I had a customer recently tell me, "Oh, the cloud's secure, right?" Wrong!</p><p>Seriously, go and check your IAM permissions in AWS/Azure! Also, use MFA everywhere you can! And don't forget to train your employees to spot those phishing emails!</p><p>What experiences have you had with centralized identity management? I'm curious to hear! <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p>
0x40k<p>So, Silk Typhoon (aka Hafnium) is now going after the IT supply chain – surprise, surprise! Guess they weren't just content with Exchange Servers. Stealing API keys, exploiting PAM, and compromising cloud apps... it's practically state-of-the-art cyber espionage, isn't it?</p><p>This totally reminds me of a pentest where a seemingly harmless vendor access almost caused a complete disaster. Don't underestimate this kind of stuff, seriously!</p><p>A supply chain attack? It's like your locksmith handing out keys to burglars. Talk about a massive breach of trust!</p><p>And get this: tons of companies completely neglect their cloud configurations. IAM rights, API keys... you can almost always find something vulnerable.</p><p>Here's the takeaway: Security's way more than just your own firewall. The whole chain's gotta be secure. Don't forget to patch! And awareness training for employees is an absolute must.</p><p>What security measures do *you* think are most important? Let's hear your thoughts!</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/supplychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychain</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hafnium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hafnium</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p>
theOmegabit<p>Why AWS anti-patterns might be your next cloud security super power. </p><p><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p><a href="https://www.linkedin.com/pulse/why-aws-anti-patterns-might-your-next-cloud-security-vbsoe?utm_source=share&amp;utm_medium=member_ios&amp;utm_campaign=share_via" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/pulse/why-aws-ant</span><span class="invisible">i-patterns-might-your-next-cloud-security-vbsoe?utm_source=share&amp;utm_medium=member_ios&amp;utm_campaign=share_via</span></a></p>
The DefendOps Diaries<p>Silk Typhoon's Strategic Shift: Targeting IT Supply Chains</p><p><a href="https://thedefendopsdiaries.com/silk-typhoons-strategic-shift-targeting-it-supply-chains" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/silk-t</span><span class="invisible">yphoons-strategic-shift-targeting-it-supply-chains</span></a></p><p><a href="https://infosec.exchange/tags/silktyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>silktyphoon</span></a><br><a href="https://infosec.exchange/tags/itsupplychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsupplychain</span></a><br><a href="https://infosec.exchange/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberespionage</span></a><br><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a><br><a href="https://infosec.exchange/tags/zerodayvulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zerodayvulnerabilities</span></a></p>