Tootfinder

Opt-in global Mastodon full text search. Join the index!

@geant@mstdn.social
2025-09-24 09:22:51

Have you ever clicked a suspicious link and prayed afterwards? 👀 Or scrolled past T&Cs without a thought?

At #TNC25 we asked our community some tough (and funny) questions about #cybersecurity, #AI

This is a video as part of the GÉANT Cybersecurity Campaign 2025, where members of the NREN community are asked fire round interview questions.
@ruth_mottram@fediscience.org
2025-09-24 10:22:44

So, the new twitter appears to be Mastodon? At least on this topic? I posted exactly same thread (ht
@… ) on both here and blue sky platforms and had considerably more comment and additional input onthere than on there. I don't really get why, the other feels like there may be more users but masto is certainly the #Cybersecurity hang out, maybe there are also more Europeans?
fediscience.org/@Ruth_Mottram/

@ErikJonker@mastodon.social
2025-07-21 16:19:46

What a mess....
#sharepoint #microsoft #cybersecurity

@johndoe@social.linux.pizza
2025-08-24 17:52:41

I think everyone needs to see this and understand what is happening with our online privacy #privacy #cybersecurity #censorship

@adulau@infosec.exchange
2025-09-20 10:09:15

Collins Aerospace (RTX) was already targeted by ransomware in 2023 by BianLian at that time. Sometime life is just a continuous repetition.
#cybersecurity #collinsaerospace

@kurtsh@mastodon.social
2025-08-20 01:27:56

SOMEONE'S GONNA GET HAAAACKED still unpatched after 6 months...
Original post: #cybersecurity

@adulau@infosec.exchange
2025-07-20 06:04:49

Customer guidance for SharePoint vulnerability CVE-2025-53770 | MSRC Blog | Microsoft Security Response Center
#sharepoint #cybersecurity #vulnerability
🔗

@deepthoughts10@infosec.exchange
2025-09-14 15:38:33

This is really useful for incident investigations. I’m excited to try it out.
#cybersecurity #threatintel
From: @…

@ErikJonker@mastodon.social
2025-09-19 13:06:41

RE: #cybersecurity

@bogo@hapyyr.com
2025-08-20 07:06:48

GitHub is still #1 malware hosting platform with a take-down period of 14 days. Please be careful!
#malware

@ErikJonker@mastodon.social
2025-08-22 14:17:07

Interesting blog about creating a fully encrypted cloud storage on nextcloud.
community.hetzner.com/tutorial

@deepthoughts10@infosec.exchange
2025-07-15 12:43:57

I learned something new today—threat actors are using AWS Lambda URLs for C2. Lambda is an ephemeral serverless function service from AWS. They have different URL endpoints in the different AWS regions. One example is: <uniquename>.lambda-url.ap-southeast-1.on[.]aws
Something you may want to hunt for. #cybersecurity

@ruth_mottram@fediscience.org
2025-09-22 07:08:55

Well this is wild. #cybersecurity #NorthKorea's missile programme #espionage #Organisedcrime and probably #SlaveWorkers
I love how @frederikkulager.bsky.social explains the internet in this series. But this might be the wildest yet.
zetland.dk/historie/sde06zSH-m

@johndoe@social.linux.pizza
2025-07-19 19:56:14

Just my two cents on the latest malicious AUR packages. This should serve as a reminder to everyone to not install whatever you find on AUR. Be critical, do some due dilligence to verify legimiacy. Check if if what you are looking for exist in pacman first. #cybersecurity #infosec

@ErikJonker@mastodon.social
2025-07-21 16:35:20

Incredible if you think about it...
"The bug, when exploited, allows hackers to steal private digital keys from SharePoint servers without needing any credentials to log in. Once in, the hackers can remotely plant malware, and gain access to the files and data stored within"
Big #Microsoft

@adulau@infosec.exchange
2025-08-11 06:20:08

Finally a useful magic quadrant
Thanks to @… for the discovery.
#cybersecurity #vulnerability

Funny magic cadrant ;-)

Diagram scoring various firewall/VPN vendors on two axes and grouping them in four quadrants. The x-axis is labeled "Completeness of filesystem access"; the y-axis is labeled "ability to execute arbitrary commands". The bottom left quadrant ("Niche Players") contains a low-x, low-y point labeled "Some Unusable BSD Bullshit"; a bit further to the right there is IBM and a bit further up there is F5. The top left quadrant ("Challengers" with low filesystem access and high …
@deepthoughts10@infosec.exchange
2025-09-04 00:27:14

The registry keys referenced in this article are good things to check for in your environment. There aren’t many legitimate uses for macros and VBA in Outlook and you should ensure that functionality is disabled and stays that way.
#cybersecurity
From: @…

@ErikJonker@mastodon.social
2025-08-14 12:37:51

All the talks you can look back from #Why2025
#cybersecurity

@adulau@infosec.exchange
2025-07-18 14:08:34

Curious about all the open source and projects developed by @… ?
CIRCL Open Source tools powering SOC & CSIRT teams.
#opensource

CIRCL Open Source tools and SOC/CSIRT eco-system
@deepthoughts10@infosec.exchange
2025-07-10 12:58:13

This looks like an awesome free tool from Microsoft to help guide an organization through a zero trust assessment, and to help keep track of your progress. #cybersecurity
From: @…

@adulau@infosec.exchange
2025-07-09 14:51:22

In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology.
#esim #cybersecurity #mobilesecurity

@deepthoughts10@infosec.exchange
2025-07-08 13:04:29

These one-pagers on common AiTM phishing kits are great! #cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-07-09 13:10:50

Do you invest in #crypto or are you a public figure? You should take action to prevent a SIM swap attack. #cybersecurity
From: @…

@ruth_mottram@fediscience.org
2025-09-15 05:58:34

A really excellent #UnbreakingNews podcast this morning.
#cybersecurity, the environmental challenges of the #GreenTransition and
#FinTech's but now pay later trap. Plus the religious fight back against "satanic" music bravo @eurcorrespond.bsky.social
europeancorrespondent.com/en/s

@deepthoughts10@infosec.exchange
2025-07-08 22:20:38

More than a decent intro — this article brings most publicly available #threatintel about Scattered Spider together in one comprehensive article. It’s a great read with a lot of technical information for those that like that sort of thing. #cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-08-07 21:37:01

Anyone ever see one of these before on iOS? I don’t use the reminders app. I don’t know anyone by the name Iaoqi Meng. Is this some new kind of #phish ? I can’t figure out where it came from. I have no email messages or calendar items that match this #cybersecurity

iOS notification saying I have an “Invitation to share a reminder list with Iaoqi meng”
@deepthoughts10@infosec.exchange
2025-09-03 23:06:47

Do you use Salesforce and Salesloft Drift? Check this out.
#cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-09-03 23:34:10

This article provides quite a few IOCs to hunt for in your environment. Find the badness!
#cybersecurity #threatintel
From: @…

@deepthoughts10@infosec.exchange
2025-09-02 13:02:45

Really deep dive into how commercial spyware works on mobile phones. Very useful detection and prevention ideas too. #cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-08-02 15:15:22

If you are interested in seeing how IDS rules work, or in trying to write your own, take a look to see how an expert does it. #cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-07-27 20:33:59

If you are a Microsoft Entra ID shop, I highly recommend following this article’s advice on Conditional Access Policy implementation #cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-07-08 22:29:53

Do you use #Okta? If so, I highly recommend a defensive domain registration to help protect your org. Register yourdomain-okta.com as that is frequently used by a very successful threat actor. If that domain is already registered and your org didn’t register it? Watch out! Read the below article for more details.