2026-01-28 14:06:35
Ich teile mal hier diese interessante Diskussion auf administrator.de #administrator #cybersecurity #depol
Ich teile mal hier diese interessante Diskussion auf administrator.de #administrator #cybersecurity #depol
Red Canary’s March Intelligence Insights report is out. They provide detection opportunities for common Windows and MacOS exploits #cybersecurity
https://redcanary.com/blog/threat-inte…
We need id for vulnerabilities on online services. Documenting is critical.
#cybersecurity #vulnerability
Security: Learning the Language of Privacy by Matthew Plascencia
Watch now: https://youtu.be/qV5KVKQdCmI?si=imAhOc_xz9p-MfAn
🔒 Dive into the essentials of privacy and security in the open source world!
gcve-eu-kev updated — a CISA KEV and ENISA CNW/EUVD to GCVE BCP-07 converter.
It now also includes a generic RSS/Atom exporter for any GCVE KEV BCP-07 feed.
@…
#cybersecurity
Geoshitties for the win! If you use @… ‘s blocklists you’d have already blocked *.vercel.app which is a key link in the kill chain for this attack described by Microsoft. My advice: block Vercel for everyone in your org except for those that have a business need. #cybersecurity
others) that are most important to assess the added value.
3. What concrete measures and actions may be taken at EU level to support the development and growth of the
EU open-source sector and contribute to the EU’s technological #sovereignty and #cybersecurity agenda?
4. What technology areas should be prioritised and why?
5. In what sectors could an increased use of open source lead to increased competitiveness and #CyberResilience?
2/2
🚨 Critical #Telnet Authentication Bypass Vulnerability Discovered #CVE202624061 #cybersecurity #infosec
You have a verified LinkedIn account, read this. #microsoft #linkedin #privacy #cybersecurity
My company’s Cybersecurity Awareness training is ON-POINT: (For everything except #mastodon ) #cybersecurity
The US withdrawing from many organisations including GFCE (Global Forum on Cyber Expertise) doesn’t look promising about their commitment to cybersecurity.
#us #cybersecurity
Interesting article from #cybersecurity researchers at ITRes on yet another flavor of “EDR silencer” tactics, this time using a maliciously activated VPN connection that “sinks” or blocks traffic to EDR telemetry endpoints. Helpfully, they include detection and prevention techniques too, including likely the best idea, restricting by technical policy who can create VPN profiles.
"President Trump’s CYBER STRATEGY for America"
The strategy does not explicitly mention Coordinated Vulnerability Disclosure (CVD) or vulnerability disclosure programs.
Basically it's more about offensive posture, infrastructure protection, and technology dominance.
Cybersecurity independence for Europe is no longer optional, it has become a strategic necessity.
#cybersecurity
I’ve been very happy with uBlock Origin Lite since being forced to switch from the original. I appreciate the ad blocker devs putting in the work to make this happen. #cybersecurity
This NSE Checks for Ivanti EPMM MDM by requesting a known API endpoint.
#ivanti #nmap #cybersecurity
🔗
RE: #cybersecurity
Reliaquest has a post on attacker’s use of .SCR files to install remote access software. SCR (screensaver) files _are_ executable files. If you don’t already, please block .scr files from being emailed to your end users. #cybersecurity
New Ngrok domain available.,if you don’t use this service, you should block it as it is frequently used for data exfil and C2.
ngrok-agent[.]com
cc: @…
#cybersecurity
RE: #ioc
RE: #cybersecurity
RE: https://infosec.exchange/@ScumBots/116195646833821026
Come ‘on now?!? Who still doesn’t have *.ngrok.io blocked? Ngrok themselves don’t even recommend using this domain any longer.