sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#itsecurity

15 Beiträge13 Beteiligte4 Beiträge heute
Hacker News<p>Want to piss off your IT department? Are the links not malicious looking enough?</p><p><a href="https://phishyurl.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">phishyurl.com/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ITdepartment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITdepartment</span></a> <a href="https://mastodon.social/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://mastodon.social/tags/links" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>links</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/awareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>awareness</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>Aikido Safe Chain</p><p>The Aikido Safe Chain prevents developers from installing malware on their workstations through npm, npx, yarn, pnpm and pnpx. It's free to use and does not require any token.</p><p>✅ <a href="https://www.npmjs.com/package/@aikidosec/safe-chain" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">npmjs.com/package/@aikidosec/s</span><span class="invisible">afe-chain</span></a></p><p><a href="https://chaos.social/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://chaos.social/tags/javasript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javasript</span></a> <a href="https://chaos.social/tags/savechain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>savechain</span></a> <a href="https://chaos.social/tags/aikido" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aikido</span></a> <a href="https://chaos.social/tags/js" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>js</span></a> <a href="https://chaos.social/tags/ts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ts</span></a> <a href="https://chaos.social/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> <a href="https://chaos.social/tags/typescript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typescript</span></a> <a href="https://chaos.social/tags/npmjs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npmjs</span></a> <a href="https://chaos.social/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://chaos.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://chaos.social/tags/npmhell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npmhell</span></a> <a href="https://chaos.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://chaos.social/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://chaos.social/tags/npx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npx</span></a> <a href="https://chaos.social/tags/yarn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yarn</span></a> <a href="https://chaos.social/tags/pnpm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pnpm</span></a> <a href="https://chaos.social/tags/pnpx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pnpx</span></a> <a href="https://chaos.social/tags/bun" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bun</span></a></p>
GAI NetConsult<p>🔎 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗶𝗻 𝗦𝗶𝗲𝗺𝗲𝗻𝘀 𝗦𝗜𝗣𝗥𝗢𝗧𝗘𝗖 𝟱 𝗜𝗱𝗲𝗻𝘁𝗶𝗳𝗶𝗲𝗱</p><p>Our Technical Security Audit team has identified a vulnerability in 𝗦𝗶𝗲𝗺𝗲𝗻𝘀 𝗦𝗜𝗣𝗥𝗢𝗧𝗘𝗖 𝟱 𝗱𝗲𝘃𝗶𝗰𝗲𝘀:<br>⚠️ The USB port may allow attacks due to improper bandwidth limitation.</p><p>📌 Description:<br>Affected SIPROTEC 5 devices do not properly limit the bandwidth for incoming network packets over their local USB port. This could allow an attacker with physical access to send specially crafted packets with high bandwidth to the affected devices thus forcing them to exhaust their memory and stop responding to any network traffic via the local USB port. Affected devices reset themselves automatically after a successful attack. During this restart the protection function is not available. </p><p>📄 The full advisory is available here: <a href="https://www.gai-netconsult.de/wp-content/uploads/2025/09/Advisory-GAINC-2025-001-1.0.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gai-netconsult.de/wp-content/u</span><span class="invisible">ploads/2025/09/Advisory-GAINC-2025-001-1.0.pdf</span></a></p><p>⚠️ Please follow the manufacturer’s guidance and updates.</p><p>🌐 An overview of further advisories can be found on our website: www.gai-netconsult.de/advisories</p><p>👏 Congratulations to our colleagues 𝗠𝗮𝗿𝗰 𝗖𝘂𝗻𝘆 and 𝗧𝗼𝗿𝗮𝗹𝗳 𝗚𝗶𝗺𝗽𝗲𝗹 for this discovery.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SecurityAdvisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAdvisory</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/GAINetConsult" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAINetConsult</span></a> <a href="https://infosec.exchange/tags/SecurityNotice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityNotice</span></a></p>
GAI NetConsult<p>🔎 𝗦𝗶𝗰𝗵𝗲𝗿𝗵𝗲𝗶𝘁𝘀𝗹𝘂̈𝗰𝗸𝗲 𝗶𝗻 𝗦𝗶𝗲𝗺𝗲𝗻𝘀 𝗦𝗜𝗣𝗥𝗢𝗧𝗘𝗖 𝟱 𝗶𝗱𝗲𝗻𝘁𝗶𝗳𝗶𝘇𝗶𝗲𝗿𝘁</p><p>Mitarbeiter unseres Teams für Technical Security Audits haben eine Schwachstelle in 𝗦𝗶𝗲𝗺𝗲𝗻𝘀 𝗦𝗜𝗣𝗥𝗢𝗧𝗘𝗖 𝟱-𝗚𝗲𝗿𝗮̈𝘁𝗲𝗻 identifiziert:<br>⚠️ Der USB-Port kann durch eine fehlerhafte Bandbreitenbegrenzung Angriffe ermöglichen.</p><p>📌 Beschreibung:<br>Betroffene SIPROTEC 5-Geräte begrenzen die Bandbreite für eingehende Netzwerkpakete über ihren lokalen USB-Anschluss nicht ordnungsgemäß. Ein Angreifer mit physischem Zugriff könnte speziell manipulierte Pakete mit hoher Bandbreite senden und dadurch den Speicher des Geräts erschöpfen. Die Folge: Die Geräte reagieren nicht mehr auf den Netzwerkverkehr über den USB-Port, setzen sich automatisch zurück und während des Neustarts ist die Schutzfunktion nicht verfügbar.</p><p>📄 Das zugehörige Advisory ist hier abrufbar: <a href="https://www.gai-netconsult.de/wp-content/uploads/2025/09/Advisory-GAINC-2025-001-1.0.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gai-netconsult.de/wp-content/u</span><span class="invisible">ploads/2025/09/Advisory-GAINC-2025-001-1.0.pdf</span></a></p><p>⚠️ Bitte beachten Sie die Hinweise und Updates des Herstellers.</p><p>🌐 Weitere Advisories finden Sie auf unserer Webseite: www.gai-netconsult.de/advisories</p><p>👏 Wir gratulieren unseren Kollegen 𝗠𝗮𝗿𝗰 𝗖𝘂𝗻𝘆 und 𝗧𝗼𝗿𝗮𝗹𝗳 𝗚𝗶𝗺𝗽𝗲𝗹 zu diesem Fund.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SecurityAdvisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAdvisory</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/GAINetConsult" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAINetConsult</span></a> <a href="https://infosec.exchange/tags/Sicherheitsmeldung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsmeldung</span></a></p>
Clemens<p>Who shall I follow for infosec topics? I found some very cool accounts so far. I bet there are more than I follow yet.</p><p><a href="https://troet.cafe/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://troet.cafe/tags/itsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsec</span></a> <a href="https://troet.cafe/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
The DefendOps Diaries<p>A unified approach can transform IT security. Discover how team-wide VMware certification is slashing misconfigurations, boosting efficiency, and even grooming tomorrow’s leaders. Curious how it all adds up?</p><p><a href="https://thedefendopsdiaries.com/the-strategic-benefits-of-team-wide-vmware-certification/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/the-st</span><span class="invisible">rategic-benefits-of-team-wide-vmware-certification/</span></a></p><p><a href="https://infosec.exchange/tags/vmwarecertification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vmwarecertification</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a><br><a href="https://infosec.exchange/tags/teamdevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>teamdevelopment</span></a><br><a href="https://infosec.exchange/tags/leadership" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>leadership</span></a></p>
hackmac<p>Bei der NRW-Kommunalwahl wurden Ergebnisse in einzelnen Kommunen zeitweise nicht online angezeigt – die Polizei spricht von Überlastung, schließt einen Cyberangriff aus. Aber: Wie gut wären unsere Kommunen auf solche Szenarien vorbereitet? Gibt es für die Kapazitäten Redundanzen? Gibt es ein Monitoring, das ungewöhnliche Traffic-Muster, Angriffsversuche etc. erkennt? In Wahlprozessen zählt Glaubwürdigkeit besonders. <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Kommunen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kommunen</span></a> <a href="https://mastodon.social/tags/Kommunalwahl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kommunalwahl</span></a> <a href="https://mastodon.social/tags/Demokratie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Demokratie</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/Digitalisierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Digitalisierung</span></a></p>
HiSolutions<p>🔐 IT-Sicherheitskonferenz 2025 – Save the Date!</p><p>📅 30.09.–02.10. | 📍 Hochschule Stralsund | 💻 Hybrid (Präsenz &amp; Livestream)</p><p>Zum 14. Mal treffen sich IT-Profis, Entscheider:innen und Interessierte zum Austausch über aktuelle Trends, spannende Vorträge und Networking in der IT-Security-Welt.</p><p>🎤 Highlight: Unser Kollege Marcel Heisel erklärt in seinem Vortrag die Unterschiede zwischen Red-Teaming, Penetrationstests und technischen Audits – und wann was sinnvoll ist.</p><p>👉 Infos und Anmeldung: <a href="https://www.it-sicherheitskonferenz.de/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">it-sicherheitskonferenz.de/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ITSK2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSK2025</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/PenTest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTest</span></a> <a href="https://infosec.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://infosec.exchange/tags/Stralsund" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stralsund</span></a> <a href="https://infosec.exchange/tags/ITKonferenz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITKonferenz</span></a> <a href="https://infosec.exchange/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSicherheit</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/Redteaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Redteaming</span></a> <a href="https://infosec.exchange/tags/ITSicherheitskonferenz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSicherheitskonferenz</span></a></p>
hackmac<p>Drucker: Die unterschätzte Sicherheitslücke in vielen Unternehmen! Eine aktuelle Studie von HP Wolf Security zeigt, dass nur 37 % der IT-Verantwortlichen Firmware-Updates bei ihren Druckern umgehend einspielen. Wenn Drucker weiterhin als Nebenerscheinung behandelt werden, laden wir Angreifer ein. Die Lösung ist einfach, aber konsequent: Druckerflotte als festen Teil der IT-Security-Roadmap betrachten. <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/Print" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Print</span></a> <a href="https://mastodon.social/tags/Drucker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Drucker</span></a> <a href="https://mastodon.social/tags/printer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>printer</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/hackerangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackerangriff</span></a></p>
DR IT Security and Privacy<p>Das <span class="h-card" translate="no"><a href="https://social.bund.de/@bsi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bsi</span></a></span> bietet ein Medienpaket für <a href="https://infosec.exchange/tags/paedagoginnen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>paedagoginnen</span></a> und <a href="https://infosec.exchange/tags/eltern" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eltern</span></a> an zu verschiedenen Themen rund um <a href="https://infosec.exchange/tags/informationssicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationssicherheit</span></a></p><p>Zielpublikum sind 10 bis 14 Jährige. Lohnt aber auch für Ältere Personen 😀 </p><p><a href="https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2025/250909_Cybersicherheit_Medienpaket_Unterricht.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsi.bund.de/DE/Service-Navi/Pr</span><span class="invisible">esse/Pressemitteilungen/Presse2025/250909_Cybersicherheit_Medienpaket_Unterricht.html</span></a></p><p><a href="https://infosec.exchange/tags/bildung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bildung</span></a> <a href="https://infosec.exchange/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://infosec.exchange/tags/jugendliche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jugendliche</span></a> <a href="https://infosec.exchange/tags/schule" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>schule</span></a> <a href="https://infosec.exchange/tags/informatikEdu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informatikEdu</span></a></p>
NullPointerException :verified_neko:AI makes people dumb. Especially new hires.
Marco Ciappelli🎙️✨:verified: :donor:<p>New Cybersecurity Webinar Highlight.</p><p>Check it out and, if you like it, watch the full episode </p><p><a href="https://www.crowdcast.io/c/how-to-detect-and-mitigate-non-human-identity-and-crytographic-vulnerabilities-an-itspmagazine-webinar-with-sandboxaq" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">crowdcast.io/c/how-to-detect-a</span><span class="invisible">nd-mitigate-non-human-identity-and-crytographic-vulnerabilities-an-itspmagazine-webinar-with-sandboxaq</span></a></p><p>Teaser:<br><a href="https://youtu.be/xIgn5T7Hbu0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/xIgn5T7Hbu0</span><span class="invisible"></span></a></p><p>🔐 Enterprise Security's Hidden Crisis: Non-Human Identities &amp; Cryptographic Assets<br>Most security teams are flying blind when it comes to non-human identities—API keys, certificates, service accounts—creating critical vulnerabilities across enterprise environments. This highlights reel from our expert panel reveals how these gaps fuel breaches, compliance nightmares, and operational drag.<br>Key Insights from This Panel:</p><p>Why traditional security approaches miss non-human identity risks<br>How unified visibility transforms cryptographic asset management<br>Real-world strategies for automated discovery and threat detection<br>Preparing for post-quantum cryptography challenges<br>Integration approaches that don't disrupt existing workflows</p><p>Featured Expert:<br>Marc Manzano, General Manager of Cybersecurity at SandboxAQ, demonstrates how AQtive Guard's AI-driven platform addresses these critical blind spots with automated discovery, real-time threat detection, and root cause analysis.<br>Moderated by:<br>Sean Martin, CISSP &amp; Marco Ciappelli, Co-Founders of ITSPmagazine</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a><br><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a><br><a href="https://infosec.exchange/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a><br><a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a><br><a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a><br><a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a><br><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a><br><a href="https://infosec.exchange/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a><br><a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a><br><a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a><br><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a><br><a href="https://infosec.exchange/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a><br><a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a><br><a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a><br><a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a><br><a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a><br><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a><br><a href="https://infosec.exchange/tags/APIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APIsecurity</span></a><br><a href="https://infosec.exchange/tags/enterprisesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enterprisesecurity</span></a><br><a href="https://infosec.exchange/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a><br><a href="https://infosec.exchange/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a><br><a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <br><a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a><br><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p>
Ami<p>If everyone knew how easy it was to <a href="https://mastodon.world/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> they wouldn't support weakening or breaking <a href="https://mastodon.world/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> and would rage against "age verification".</p><p>There is ALWAYS a way to hack into something. Companies need to get lucky all day, every day, hackers need to get lucky once.</p><p>As I tell my clients, it's just a matter of time. It's not an IF you get hacked, but is a WHEN.</p><p>And big tech can't be trusted, they are watching, they are harvesting thousands of data points on you.</p><p><a href="https://mastodon.world/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://mastodon.world/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mastodon.world/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p>
Thomas Elmiger<p>Hast du Erfahrung im Incident Response oder Security-Operations-Umfeld – idealerweise in kritischen Infrastrukturen?</p><p><a href="https://ekzplus.talentry.com/share/job/728547/681403/1757658594/3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ekzplus.talentry.com/share/job</span><span class="invisible">/728547/681403/1757658594/3</span></a></p><p><a href="https://mastodon.social/tags/Stellenangebot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stellenangebot</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://mastodon.social/tags/SecurityOperations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityOperations</span></a> <a href="https://mastodon.social/tags/Schweiz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schweiz</span></a></p>
Klaudia (aka jinxx)<p>Tag drei des <a href="https://literatur.social/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a>-Security Kurses, oder auch: Sagten Sie offene, öffentliche Schnittstellen? O.M.G. <a href="https://literatur.social/tags/ITSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSec</span></a> <a href="https://literatur.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://literatur.social/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a></p>
HiSolutions<p>𝗛𝗮𝗰𝗸𝗛𝗘𝗥𝘁𝗵𝗼𝗻 𝗮𝗺 𝗕𝗲𝗿𝗹𝗶𝗻𝗲𝗿 𝗦𝘁𝗮𝗻𝗱𝗼𝗿𝘁<br>👱‍♀️👩Es gibt für Frauen immer noch einige Hürden bei der Teilnahme von Informatik-Events oder gar dem Ergreifen von technischen Berufen. Um dem entgegenzuwirken und einen Raum für Gleichgesinnte zu schaffen, in dem sich jede individuell weiterentwickeln und ihrem Informatikinteresse nachgehen kann, veranstaltete <span class="h-card" translate="no"><a href="https://infosec.exchange/@hisolutions" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hisolutions</span></a></span> das zweite Jahr infolge ein HackHERthon-Event für Personen, die sich als Frau identifizieren.</p><p>Die Veranstaltung ermöglichte den Teilnehmerinnen sich in ihrem eigenen Tempo Herausforderungen zu stellen, sich auszutauschen und selbständig Neues zu lernen.</p><p>🗓 An Tag 1 fand ein <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a>-Wettbewerb statt, bei dem verschiedene Aufgaben aus Kryptografie, Forensik und OSINT unterschiedlicher Schwierigkeitsstufen bearbeitet werden konnten.</p><p>🗓 An Tag 2 und 3 wurde ein klassischer Hackathon abgehalten, bei dem sich in Kleingruppen einem Projekt gewidmet wurde.</p><p>Unter den über 20 Teilnehmerinnen waren Studentinnen sowie Berufstätige und Interessierte unterschiedlichen Erfahrungslevels, die sich gegenseitig unterstützten und sich individuell weiterentwickelten. Wir freuen uns sehr über die rege Teilnahme aller!</p><p>Vielen Dank an unsere engagierten Kolleginnen und Kollegen für die Vorbereitung und Durchführung der drei Tage 💙</p><p><a href="https://infosec.exchange/tags/hackathon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackathon</span></a> <a href="https://infosec.exchange/tags/ITForensik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITForensik</span></a> <a href="https://infosec.exchange/tags/iOT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOT</span></a> <a href="https://infosec.exchange/tags/CaptureTheFlag" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CaptureTheFlag</span></a> <a href="https://infosec.exchange/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://infosec.exchange/tags/womenintech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>womenintech</span></a></p>
arnoldmelm<p>Vorsicht bei <a href="https://mastodon.social/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> bzw node.js.</p><p>Angreifer haben Schadcode in mehrere beliebte NPM-Pakete eingeschleust. Betroffen sind vor allem die beliebten Pakete des Entwicklers mit dem Pseudonym Qix, der Opfer einer Phishing-Attacke geworden ist.<br><a href="https://mastodon.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://mastodon.social/tags/itsicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsicherheit</span></a> <a href="https://mastodon.social/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> <br><a href="https://www.linux-magazin.de/news/zahlreiche-npm-pakete-kompromittiert/?mc_cid=38f0166144&amp;mc_eid=53157800ee#" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazin.de/news/zahlreic</span><span class="invisible">he-npm-pakete-kompromittiert/?mc_cid=38f0166144&amp;mc_eid=53157800ee#</span></a></p>
Klaudia (aka jinxx)<p>Also diese <a href="https://literatur.social/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a>-Security Kurs ist eher so: "Also wenn man diese 28 Schritte einhält und darauf achtet, dass diese 37 Einstellungen korrekt gesetzt sind, dann sollte theoretisch nichts passieren können. Leider hat das Management entscheiden, dass Schritt 1, MFA, aus Kostengründen nicht umgesetzt wird. Für den Rest gibt's keine Prozesse. Und Logs lesen dürfen eh auch alle." 🙈 Von dem Adobe-<a href="https://literatur.social/tags/Tracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tracking</span></a> in mindestens der Cloud-Trial fang ich jetzt gar nicht erst an. <a href="https://literatur.social/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://literatur.social/tags/ITSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSec</span></a> <a href="https://literatur.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>»How Do I Block an IP Address on My Linux server?<br>How do I block an IP address or subnet (CIDR) under Linux operating system?«<br>– by <span class="h-card" translate="no"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nixCraft</span></a></span></p><p>I do not want to allow certain data swallowers that market the data for themselves again and these lists are now very long.</p><p>🐧 <a href="https://www.cyberciti.biz/faq/how-do-i-block-an-ip-on-my-linux-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyberciti.biz/faq/how-do-i-blo</span><span class="invisible">ck-an-ip-on-my-linux-server/</span></a></p><p><a href="https://chaos.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://chaos.social/tags/config" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>config</span></a> <a href="https://chaos.social/tags/blockip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blockip</span></a> <a href="https://chaos.social/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://chaos.social/tags/aiblocked" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aiblocked</span></a> <a href="https://chaos.social/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> <a href="https://chaos.social/tags/swallow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>swallow</span></a> <a href="https://chaos.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a> <a href="https://chaos.social/tags/system" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>system</span></a> <a href="https://chaos.social/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://chaos.social/tags/systemsettings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemsettings</span></a> <a href="https://chaos.social/tags/config" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>config</span></a> <a href="https://chaos.social/tags/webserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webserver</span></a> <a href="https://chaos.social/tags/webhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webhosting</span></a> <a href="https://chaos.social/tags/IPAddresses" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPAddresses</span></a></p>
DerSchulze<p>Gibt es eigentlich schon irgendwelche Mittel und Decrypt Programme wenn z.B. ein Windows Server von Crypto Betrügern kompromittiert wurde? Oder hat man dann erstmal die Arschkarte? Frage für einen Freund.... <a href="https://elbmatsch.de/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a></p>