
2025-09-24 09:22:51
Have you ever clicked a suspicious link and prayed afterwards? 👀 Or scrolled past T&Cs without a thought?
At #TNC25 we asked our community some tough (and funny) questions about #cybersecurity, #AI
Have you ever clicked a suspicious link and prayed afterwards? 👀 Or scrolled past T&Cs without a thought?
At #TNC25 we asked our community some tough (and funny) questions about #cybersecurity, #AI
So, the new twitter appears to be Mastodon? At least on this topic? I posted exactly same thread (ht
@… ) on both here and blue sky platforms and had considerably more comment and additional input onthere than on there. I don't really get why, the other feels like there may be more users but masto is certainly the #Cybersecurity hang out, maybe there are also more Europeans?
https://fediscience.org/@Ruth_Mottram/115255377612495056
I think everyone needs to see this and understand what is happening with our online privacy #privacy #cybersecurity #censorship
Collins Aerospace (RTX) was already targeted by ransomware in 2023 by BianLian at that time. Sometime life is just a continuous repetition.
#cybersecurity #collinsaerospace
SOMEONE'S GONNA GET HAAAACKED still unpatched after 6 months...
Original post: #cybersecurity
Customer guidance for SharePoint vulnerability CVE-2025-53770 | MSRC Blog | Microsoft Security Response Center
#sharepoint #cybersecurity #vulnerability
🔗
This is really useful for incident investigations. I’m excited to try it out.
#cybersecurity #threatintel
From: @…
RE: #cybersecurity
GitHub is still #1 malware hosting platform with a take-down period of 14 days. Please be careful!
#malware
Interesting blog about creating a fully encrypted cloud storage on nextcloud.
https://community.hetzner.com/tutorials/encrypted-private-nextcloud-VPS-and-storagebox
I learned something new today—threat actors are using AWS Lambda URLs for C2. Lambda is an ephemeral serverless function service from AWS. They have different URL endpoints in the different AWS regions. One example is: <uniquename>.lambda-url.ap-southeast-1.on[.]aws
Something you may want to hunt for. #cybersecurity
Well this is wild. #cybersecurity #NorthKorea's missile programme #espionage #Organisedcrime and probably #SlaveWorkers
I love how @frederikkulager.bsky.social explains the internet in this series. But this might be the wildest yet.
https://www.zetland.dk/historie/sde06zSH-moGnNy6v-788f3
Just my two cents on the latest malicious AUR packages. This should serve as a reminder to everyone to not install whatever you find on AUR. Be critical, do some due dilligence to verify legimiacy. Check if if what you are looking for exist in pacman first. #cybersecurity #infosec
Incredible if you think about it...
"The bug, when exploited, allows hackers to steal private digital keys from SharePoint servers without needing any credentials to log in. Once in, the hackers can remotely plant malware, and gain access to the files and data stored within"
Big #Microsoft
Finally a useful magic quadrant
Thanks to @… for the discovery.
#cybersecurity #vulnerability
The registry keys referenced in this article are good things to check for in your environment. There aren’t many legitimate uses for macros and VBA in Outlook and you should ensure that functionality is disabled and stays that way.
#cybersecurity
From: @…
All the talks you can look back from #Why2025
#cybersecurity
Curious about all the open source and projects developed by @… ?
CIRCL Open Source tools powering SOC & CSIRT teams.
#opensource
This looks like an awesome free tool from Microsoft to help guide an organization through a zero trust assessment, and to help keep track of your progress. #cybersecurity
From: @…
In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology.
#esim #cybersecurity #mobilesecurity
These one-pagers on common AiTM phishing kits are great! #cybersecurity
From: @…
https://
Do you invest in #crypto or are you a public figure? You should take action to prevent a SIM swap attack. #cybersecurity
From: @…
A really excellent #UnbreakingNews podcast this morning.
#cybersecurity, the environmental challenges of the #GreenTransition and
#FinTech's but now pay later trap. Plus the religious fight back against "satanic" music bravo @eurcorrespond.bsky.social
https://europeancorrespondent.com/en/s/listen
More than a decent intro — this article brings most publicly available #threatintel about Scattered Spider together in one comprehensive article. It’s a great read with a lot of technical information for those that like that sort of thing. #cybersecurity
From: @…
Anyone ever see one of these before on iOS? I don’t use the reminders app. I don’t know anyone by the name Iaoqi Meng. Is this some new kind of #phish ? I can’t figure out where it came from. I have no email messages or calendar items that match this #cybersecurity
Do you use Salesforce and Salesloft Drift? Check this out.
#cybersecurity
From: @…
https://…
This article provides quite a few IOCs to hunt for in your environment. Find the badness!
#cybersecurity #threatintel
From: @…
…
Really deep dive into how commercial spyware works on mobile phones. Very useful detection and prevention ideas too. #cybersecurity
From: @…
If you are interested in seeing how IDS rules work, or in trying to write your own, take a look to see how an expert does it. #cybersecurity
From: @…
If you are a Microsoft Entra ID shop, I highly recommend following this article’s advice on Conditional Access Policy implementation #cybersecurity
From: @…
Do you use #Okta? If so, I highly recommend a defensive domain registration to help protect your org. Register yourdomain-okta.com as that is frequently used by a very successful threat actor. If that domain is already registered and your org didn’t register it? Watch out! Read the below article for more details.