Tootfinder

Opt-in global Mastodon full text search. Join the index!

@jtk@infosec.exchange
2025-10-10 19:14:48

Defensive #infosec blog editor Lari Huttunen:
"[...] the Public Exposure blog has been temporarily taken offline. This action is in response to a legal challenge over the blog’s ownership initiated by its founding sponsor [...]"

@grumpybozo@toad.social
2025-11-11 17:57:49

How is this still happening?
We all knew that hard-coded credentials were BAD and WRONG 35ya.
#InfoSec infosec.exchange/@offseq/11552

@hacksilon@infosec.exchange
2025-11-11 18:23:27

Moin #Infosec-Community in #Hamburg: Ich werde am 9.12. beim #OWASP Stammtisch Hamburg (zu Gast beim #CCC

@hex@kolektiva.social
2025-12-10 19:26:20

Also my #infosec friends could learn a thing or two here from disaster prep if this isn't already a familiar idea.
Do you have a MISL for a large scale cvss 9 0-Day that's being exploited in the wild? Have you run a table top? You fucking should. Especially since we've all been through that shit several times now. You should absolutely have a clear plan of what's gonna happen, and your whole team should be able to respond.

@grumpybozo@toad.social
2025-12-11 02:58:29

The most obvious tell of this sort of incident is the phone call.
The only IT or #infosec folks who will proactively call you about an attempt at hijacking an account are those of your employer or *maybe* your access provider.
Google, Microsoft,Apple, etc. are not calling everyone with suspicious activity on their accounts. There are not enough support agents on the planet to do that…

@TFG@social.linux.pizza
2025-10-06 05:08:04

So... vacation is over. First day at work since 2 weeks. Forgot my glasses at home. This will be an interesting day with a lot of fog.
#dfir #infosec #forensics
"why are all im…

@losttourist@social.chatty.monster
2025-09-30 08:56:22

#NIST have issued updated #password guidelines for businesses. Interestingly they now say that requiring special characters is no longer a recommendation, but longer passwords / passphrases (using spaces) is a better idea.
I say "interesting" because that's something I've been doing for many years, long before I discovered password managers to remember things for me.
#infosec

@floheinstein@chaos.social
2025-09-16 08:09:39

Why use a URL shortener when you can use a phishy URL extender?
#infosec

https://cheap-bitcoin.online/backdoor-loader/rat-controller/malware_patch.exe?cachecontrol=inject&cookievalue=steal&file=poison&id=fc3188fb&payload=%28function%28%29%7B+return+Math.floor%284.9%29%3B+%7D%29%28%29%3B&port=scan
@castarco@hachyderm.io
2025-12-07 19:19:03

I'm using #Anubis to protect our Forgejo instance from scrapper #bots, but it doesn't seem to be enough for "classic" malicious scanners that try thousands of paths looking for vulnerabilities.
Granted, presenting a challenge increases the cost for the malicious scanners, but at some point I'd like a smarter tool that detects what's happening and blocks any further attempt.
Does anyone know about good solutions for this? I'm sure there must be something out there, I'm just ignorant about it.
#infosec #WebSecurity

@TFG@social.linux.pizza
2025-10-06 11:33:54

The moment when you want to take a picture of an evidence for documentation and you don't know if the autofocus of the cam is not getting it or if it's the glasses you forgot at home this morning...
#dfir #forensics

@davidaugust@mastodon.online
2025-11-24 16:58:47

In case you had not yet seen this elsewhere.
#gmail #ai #privacy #infosec

screenshot of a 2 post thread: 

@ash.renee411 

Gmail rolled out an update on October 10, 2025, and a lot of people didn't notice what it actually does. 
Google's Gemini can now automatically scan everything in your inbox - emails, attachments, receipts, financial docs, all of it - to train their Al and build ad profiles. 
If you don't want that, you can turn it off. 

1/2 

@ash.renee411 

1. Open Gmail in your browser 
2. Go to All Settings 
3. Under General, scroll to Smart features and per…
@grumpybozo@toad.social
2025-09-12 18:14:49

Oh #ShadowServer, now you're just being silly...
#InfoSec #Scanners

Snippet from a listing of a security log, showing a ShadowServer IPv4 address attempting to contact a (redacted) RFC1918 IPv4 address and being denied because the packet is supposedly protocol ID 41 (IPv6) 

Raw text, 3 lines: 

Sep 12 05:46:37 ‹security. info> shinyghost kernel: ipfw: 50000 Deny P:41 64.62.195.158 192.168.
Sep 12 06:05:27 ‹security.info> shinyghost kernel: ipfw: 50000 Deny P:41 64.62.195.158 192.168.
Sep 12 07:09:36 ‹security. info> shinyghost kernel: ipfw: 50000 Deny P:41 64.…