sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#vulnerabilities

4 Beiträge4 Beteiligte0 Beiträge heute

New visual for the 'Digital Forensics' section of 'Data Science for the Modern Enterprise'! We're diving deep into vulnerabilities, threats, and risk mitigation.
​Forensics isn't just about after-the-fact analysis—it's a critical part of proactive defense. What's the most surprising digital forensics case or concept you've encountered? Share your thoughts below! 👇
#digitalforensics #CyberSecurity #DataScience #RiskMitigation #InfoSec #TechTalk #Vulnerabilities #Threats #EnterpriseSecurity

[URGENT] DEF CON Researcher Exposes How Password Managers Betray Your Trust

“Czech security researcher Marek Tóth demonstrated at DEF CON 33 how a single click on any malicious website can steal passwords, credit cards, and 2FA codes from 40 million users of major password managers, with vendors like 1Password and LastPass ...continues

See gadgeteer.co.za/urgent-def-con

GadgeteerZA · [URGENT] DEF CON Researcher Exposes How Password Managers Betray Your Trust"Czech security researcher Marek Tóth demonstrated at DEF CON 33 how a single click on any malicious website can steal passwords, credit cards, and 2FA codes

🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏

Your Business Apps Are Bringing Friends You Didn't Invite

Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.

At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.

The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:

• Detect malware, tampering, and embedded secrets

• Identify #vulnerabilities and insecure practices

• Uncover undocumented network connections

• Flag #compliance risks from restricted regions

This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.

Real-world applications:

• Procurement: Auto-scan all software before deployment

• Version Monitoring: Detect unexpected behavior changes between releases

• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems

• Risk Management: Assess COTS software as part of ongoing vendor reviews

With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.

📺 Watch the video: youtu.be/pU9bHYFND7c

🎧 Listen to the podcast: brand-stories-podcast.simpleca

📖 Read the blog: itspmagazine.com/their-stories

➤ Learn more about ReversingLabs: itspm.ag/reversinglabs-v57b

✦ Catch more stories from #ReversingLabs: itspmagazine.com/directory/rev

🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25