vocalounge.cafe is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance specializing in Vocaloid, UTAU, and anything relevant to vocalsynth culture.

Administered by:

Server stats:

37
active users

#cybersecurity

21 posts16 participants0 posts today
Christoffer S.<p>It would appear as if Wiz may have discovered another supply-chain compromise:</p><p><a href="https://www.wiz.io/blog/new-github-action-supply-chain-attack-reviewdog-action-setup" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wiz.io/blog/new-github-action-</span><span class="invisible">supply-chain-attack-reviewdog-action-setup</span></a></p><p>The attack involved compromising the v1 tag of reviewdog/action-setup between March 11th 18:42 and 20:31 UTC. Unlike the tj-actions attack that used curl to retrieve a payload, this attack directly inserted a base64-encoded malicious payload into the install.sh file. When executed, the code dumped CI runner memory containing workflow secrets, which were then visible in logs as double-encoded base64 strings. The attack chain appears to have started with the compromise of reviewdog/action-setup, which was then used to compromise the tj-actions-bot Personal Access Token (PAT), ultimately leading to the compromise of tj-actions/changed-files. Organizations are advised to check for affected repositories using GitHub queries, examine workflow logs for evidence of compromise, rotate any leaked secrets, and implement preventive measures like pinning actions to specific commit hashes rather than version tags.</p><p><a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://swecyb.com/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChain</span></a></p>
Robert [KJ5ELX] :donor:<p>So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use. </p><p>Let me put the important words in uppercase. </p><p>So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use. </p><p>[Edit with H/T: <a href="https://benjojo.co.uk/u/benjojo/h/cR4dJWj3KZltPv3rqX" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">benjojo.co.uk/u/benjojo/h/cR4d</span><span class="invisible">JWj3KZltPv3rqX</span></a>]</p><p><a href="https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cloudflare.com/password-r</span><span class="invisible">euse-rampant-half-user-logins-compromised/</span></a></p><p><a href="https://infosec.exchange/tags/cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudflare</span></a> <a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>password</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
considerate<p>Which do you use more? <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Christoffer S.<p>I just published the source code for my very naive <a href="https://swecyb.com/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> implementation for generating a node network based on MITRE Intrusion Sets and Techniques. It will output linked <a href="https://swecyb.com/tags/Markdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Markdown</span></a> files linking intrusion sets to their used techniques.</p><p>Perhaps someone finds it useful or interesting to experiment with.</p><p>Source code: <a href="https://github.com/cstromblad/markdown_node" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/cstromblad/markdown</span><span class="invisible">_node</span></a></p><p>I hinted at this in a thread started by <span class="h-card" translate="no"><a href="https://mastodon.social/@Viss" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Viss</span></a></span> where he asked for input on a few very likely malicious domains. Me <span class="h-card" translate="no"><a href="https://mastodon.social/@Viss" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Viss</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cR0w</span></a></span> <span class="h-card" translate="no"><a href="https://masto.deoan.org/@neurovagrant" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>neurovagrant</span></a></span> and others did some OSINT fun work with a couple of the original domains.</p><p>It was this thread: <a href="https://mastodon.social/@Viss/114145122623079635" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@Viss/11414512</span><span class="invisible">2623079635</span></a></p><p>Now I posted a picture of a node network rendered in Obsidian and I hinted that perhaps Obsidian could be used as a poor mans version of performing threat intelligence work.</p><p><a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/Obsidian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obsidian</span></a></p>
Harry Sintonen<p>The fallout from the malicious tj-actions/changed-files is still being investigated. It is fortunate that this malicious commit was identified fairly quickly, as further compromise of major OSS components and projects could lead to a kind of chain reaction.</p><p>- <a href="https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">stepsecurity.io/blog/harden-ru</span><span class="invisible">nner-detection-tj-actions-changed-files-action-is-compromised</span></a><br>- <a href="https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">semgrep.dev/blog/2025/popular-</span><span class="invisible">github-action-tj-actionschanged-files-is-compromised/</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Brian Clark<p>The free service from portmap.io is being abused to support malware C2 communications. If you don’t use it, I suggest blocking *.portmap.io via DNS, NGFW and/or web proxy.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://infosec.exchange/@ScumBots" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ScumBots</span></a></span><br><a href="https://infosec.exchange/@ScumBots/114167879065509347" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ScumBots/114</span><span class="invisible">167879065509347</span></a></p>
Cassander<p>Is today <a href="https://infosec.exchange/tags/FediHire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediHire</span></a> Friday? Sure looks like it!</p><p>What I'm looking for: A senior level, individual contributor role supporting Windows, Active Directory, Certificates, PKI, Azure, and information security in a large environment. Interested in relocating outside of the US. I like to solve weird problems and make computers run smoothly. I want to help others use technology effectively.</p><p>My main focus the last few years has been rebuilding and modernizing a struggling certificate management team. That includes growing the team to meet our company needs, migrating our AD-integrated private PKI stack, getting a handle on our web PKI consumption, and making massive improvements to our certificate lifecycle management platform. I supported and advised our CyberSec and Desktop teams as we rolled out multi-factor authentication to 50,000 employees and contractors across the US. My background in understanding deep computer fundamentals, talent for quickly grasping nuances of larger systems, and calmness in a crisis have contributed to quickly resolving major technology outages regardless of root cause.</p><p>This role hasn't been exclusively technical. A big part of my current job is building relationships with our developers to help them understand how certificates work, the responsible ways to use them, and what our relevant internal policies are. I've been training and teaching junior and mid-level engineers both practical PKI concepts and our specific enterprise requirements. I've gotten to spend some time with upper management to both explain the immediate challenges we've had and the plans we can implement improve our infrastructure, reducing costs and outages.</p><p>While this position has been focused on certs and how to use them, I'm very comfortable considering a technical leadership role for Windows (server and desktop) administration and Active Directory. I also have some good experience with Azure and virtualization platforms, but they haven't been my daily focus for several years.</p><p>My current employer is direct retail for general public consumers. I've also worked in banking/finance, manufacturing, and architecture firms. The common thread is I love to help people leverage technology for their goals, to help them be more effective. </p><p>In my personnel/volunteer time I've done very similar: working backstage with lights/sounds/projections so live performers can do their best. </p><p>Right now I'm in Syracuse, New York (about five hours from NYC), but I'm open to relocation/migration anywhere in the world. </p><p>PMs open if you want to talk details. Boosts/reshares appreciated.</p><p><a href="https://infosec.exchange/tags/Job" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Job</span></a> <a href="https://infosec.exchange/tags/GetFediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GetFediHired</span></a> <a href="https://infosec.exchange/tags/ITJobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITJobs</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://infosec.exchange/tags/Certificate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Certificate</span></a> <a href="https://infosec.exchange/tags/PKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKI</span></a> <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/Migration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Migration</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecurity</span></a></p>
shellsharks<p>Volume SEVEN of my <a href="https://malici.ous.computer/tags/indieweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IndieWeb</span></a>, <a href="https://malici.ous.computer/tags/fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fediverse</span></a> and <a href="https://malici.ous.computer/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> / <a href="https://malici.ous.computer/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> newsletter, "Scrolls" has landed! You can read and get scrollin' here <a href="https://shellsharks.com/scrolls/scroll/2025-03-14" rel="nofollow noopener noreferrer" target="_blank">https://shellsharks.com/scrolls/scroll/2025-03-14</a>.</p><p>It features the usual awesomeness and also has a vastly improved logo, created by my good friend and super talented artist angryrolypoly (<a href="https://www.instagram.com/angryrolypoly/" rel="nofollow noopener noreferrer" target="_blank">https://www.instagram.com/angryrolypoly/</a>). He's also the genius behind a lot of the other art on my site including my Fedi profile pic!</p><p>Also, special shoutout as well to <span class="h-card"><a href="https://social.lol/@humdrum" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>humdrum</span></a></span> for making some other art for the Scrolls cause 🤗.</p><p>The art and images of Scrolls, as much as the links themselves are what make it such a pleasure to read - one more big THANK YOU to <span class="h-card"><a href="https://mastodon.art/@shaferbrown" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>shaferbrown</span></a></span> &amp; <span class="h-card"><a href="https://mastodon.social/@skeddles" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>skeddles</span></a></span> for being such talented artists. I enjoy seeing everything you post!</p><p>Finally, my mass-shouting-out of everyone else who contributed to this weeks edition! Sharing the cool stuff you find, build and create is what makes the Internet great, and this newsletter so fun to put together.</p><p><span class="h-card"><a href="https://mastodon.social/@Viss" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Viss</span></a></span> <span class="h-card"><a href="https://mastodon.social/@_elena" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>_elena</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cR0w</span></a></span> <span class="h-card"><a href="https://4d2.social/@CryogenicNighthawk" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>CryogenicNighthawk</span></a></span> <span class="h-card"><a href="https://mastodon.social/@Daojoan" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Daojoan</span></a></span> <span class="h-card"><a href="https://mstdn.social/@DM_Ronin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DM_Ronin</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@mubix" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mubix</span></a></span> <span class="h-card"><a href="https://sonomu.club/@gavcloud" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>gavcloud</span></a></span> <span class="h-card"><a href="https://indieweb.social/@fyr" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fyr</span></a></span> <span class="h-card"><a href="https://lazybear.social/@hyde" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hyde</span></a></span> <span class="h-card"><a href="https://xoxo.zone/@artlung" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>artlung</span></a></span> <span class="h-card"><a href="https://mastodon.social/@eddiedale" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eddiedale</span></a></span> <span class="h-card"><a href="https://mastodon.social/@jgilbert" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jgilbert</span></a></span> <span class="h-card"><a href="https://mastodon.social/@MastodonEngineering" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MastodonEngineering</span></a></span> <span class="h-card"><a href="https://yatil.social/@yatil" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>yatil</span></a></span> <span class="h-card"><a href="https://gofer.social/@daj" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>daj</span></a></span> <span class="h-card"><a href="https://puz.fun/@dave" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dave</span></a></span> <span class="h-card"><a href="https://ibe.social/@theresmiling" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>theresmiling</span></a></span> <span class="h-card"><a href="https://mastodon.social/@tomusher" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tomusher</span></a></span> <span class="h-card"><a href="https://mastodon.me.uk/@coffeenow" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>coffeenow</span></a></span> <span class="h-card"><a href="https://social.lol/@bjhess" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bjhess</span></a></span> <span class="h-card"><a href="https://labyrinth.social/@nash" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nash</span></a></span> <span class="h-card"><a href="https://mstdn.social/@Nickiquote" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Nickiquote</span></a></span> <span class="h-card"><a href="https://pony.social/@axxuy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>axxuy</span></a></span> <span class="h-card"><a href="https://mstdn.social/@vonExplaino" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vonExplaino</span></a></span> <span class="h-card"><a href="https://fosstodon.org/@joel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>joel</span></a></span> <span class="h-card"><a href="https://social.lol/@jmock" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jmock</span></a></span> <span class="h-card"><a href="https://tilde.zone/@xandra" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>xandra</span></a></span> <span class="h-card"><a href="https://mastodon.social/@DavidMadeThis" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DavidMadeThis</span></a></span> <span class="h-card"><a href="https://mastodon.sprawl.club/@32x33" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>32x33</span></a></span> <span class="h-card"><a href="https://mastodon.nzoss.nz/@strypey" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>strypey</span></a></span> <span class="h-card"><a href="https://mathstodon.xyz/@jskherman" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jskherman</span></a></span> <span class="h-card"><a href="https://mamot.fr/@nhoizey" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nhoizey</span></a></span> <span class="h-card"><a href="https://mementomori.social/@rolle" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rolle</span></a></span> <span class="h-card"><a href="https://gamedev.lgbt/@renkotsuban" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>renkotsuban</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@emanuelduss" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>emanuelduss</span></a></span> <span class="h-card"><a href="https://merveilles.town/@lrhodes" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lrhodes</span></a></span> <span class="h-card"><a href="https://fedi.splitbrain.org/@splitbrain" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>splitbrain</span></a></span> <span class="h-card"><a href="https://bookstodon.com/@shannonkay" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>shannonkay</span></a></span> <span class="h-card"><a href="https://mastodon.social/@ricmac" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ricmac</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@timb_machine" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>timb_machine</span></a></span> <span class="h-card"><a href="https://flipboard.social/@Flipboard" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Flipboard</span></a></span> <span class="h-card"><a href="https://mastodon.social/@sylvesterady" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sylvesterady</span></a></span></p>
Flipboard Tech Desk<p>Google's newest AI model can peruse your search history to improve its understanding of you as a person. <span class="h-card" translate="no"><a href="https://mastodon.social/@arstechnica" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>arstechnica</span></a></span> asks: What could go wrong? <a href="https://flipboard.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://flipboard.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://flipboard.social/tags/Gemeni" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gemeni</span></a> <a href="https://flipboard.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://flipboard.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://flipboard.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://flip.it/afRE32" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">flip.it/afRE32</span><span class="invisible"></span></a></p>
BGDoncaster<p>Oh really it was Ukraine that took down X on March 10? Not so fast. </p><p>Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. <a href="https://www.wired.com/story/x-ddos-attack-march-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/x-ddos-attack-</span><span class="invisible">march-2025/</span></a> <a href="https://techhub.social/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://techhub.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://techhub.social/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://techhub.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://techhub.social/tags/BotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BotNet</span></a> <a href="https://techhub.social/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a></p>
Open Rights Group<p>“There is significant public interest in knowing when and on what basis the UK government believes that it can compel a private company to undermine the privacy and security of its customers.”</p><p>ORG, Big Brother Watch and Index on Censorship call for the Tribunal into the UK government's secret order for Apple to break encryption to be held in public.</p><p>The case happens TOMORROW.</p><p>Read more ⬇️</p><p><a href="https://techcrunch.com/2025/03/13/apples-appeal-against-uks-secret-icloud-backdoor-order-must-be-held-in-public-rights-groups-urge/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/13/appl</span><span class="invisible">es-appeal-against-uks-secret-icloud-backdoor-order-must-be-held-in-public-rights-groups-urge/</span></a></p><p><a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.openrightsgroup.org/tags/ukpolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpolitics</span></a> <a href="https://social.openrightsgroup.org/tags/ukpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpol</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.openrightsgroup.org/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a></p>
Open Rights Group<p>📣 Make your voice heard through the secrecy!</p><p>By ordering Apple to break encryption, the UK government has put millions at a higher risk of their personal data, documents and photos falling into the hands of criminals and predators.</p><p>The secret tribunal is taking place this Friday – we need to take a stand for encryption!</p><p>Sign and share our petition ⬇️</p><p><a href="https://you.38degrees.org.uk/petitions/keep-our-apple-data-encrypted" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">you.38degrees.org.uk/petitions</span><span class="invisible">/keep-our-apple-data-encrypted</span></a></p><p><a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.openrightsgroup.org/tags/ukpolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpolitics</span></a> <a href="https://social.openrightsgroup.org/tags/ukpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpol</span></a> <a href="https://social.openrightsgroup.org/tags/investigatorypowersact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>investigatorypowersact</span></a></p>
Open Rights Group<p>The “case implicates the privacy rights of millions of British citizens who use Apple’s technology, as well as Apple’s international users.”</p><p>“End-to-end encryption cannot be broken in a targeted manner – once a ‘backdoor’ into the system has been created, it can be exploited by anyone, putting the privacy and security of all users at risk.”</p><p>With such high stakes, we demand to know what could possibly justify it.</p><p><a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.openrightsgroup.org/tags/ukpolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpolitics</span></a> <a href="https://social.openrightsgroup.org/tags/ukpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpol</span></a> <a href="https://social.openrightsgroup.org/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a></p>
Open Rights Group<p>"Holding this Tribunal in secret would be an affront to the global privacy and security issues that are being discussed. This is bigger than just the UK, or Apple."</p><p>We call for the case – happening this Friday – to be held in the open as a matter of public interest!</p><p>🗣️ <span class="h-card" translate="no"><a href="https://social.openrightsgroup.org/@jim" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jim</span></a></span> – ORG Executive Director.</p><p><a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.openrightsgroup.org/tags/ukpolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpolitics</span></a> <a href="https://social.openrightsgroup.org/tags/ukpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpol</span></a> <a href="https://social.openrightsgroup.org/tags/investigatorypowersact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>investigatorypowersact</span></a></p>
Open Rights Group<p>🚨 BREAKING 🚨</p><p>ORG, Big Brother Watch and Index on Censorship call for the secret Tribunal into the UK Home Office's encryption-breaching order against Apple to be held in PUBLIC 🧑‍⚖️</p><p>There's a significant public interest in knowing why the UK government believes it can compel a private company to undermine the privacy and security of its users.</p><p>Read our joint letter ⬇️</p><p><a href="https://www.openrightsgroup.org/press-releases/make-the-investigatory-powers-tribunal-on-apple-encryption-a-public-hearing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openrightsgroup.org/press-rele</span><span class="invisible">ases/make-the-investigatory-powers-tribunal-on-apple-encryption-a-public-hearing/</span></a></p><p><a href="https://social.openrightsgroup.org/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.openrightsgroup.org/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a> <a href="https://social.openrightsgroup.org/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://social.openrightsgroup.org/tags/investigatorypowersact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>investigatorypowersact</span></a> <a href="https://social.openrightsgroup.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://social.openrightsgroup.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.openrightsgroup.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.openrightsgroup.org/tags/ukpolitics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpolitics</span></a> <a href="https://social.openrightsgroup.org/tags/ukpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpol</span></a></p>
Brian Clark<p>I’ve never heard of the MSP-focused bluetrait.io but add it to the list of legitimate services that get abused. If you don’t use this RMM service, I suggest blocking it via DNS, NGFW or Web security proxy. <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://infosec.exchange/@threatinsight" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>threatinsight</span></a></span><br><a href="https://infosec.exchange/@threatinsight/114144688263847941" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@threatinsigh</span><span class="invisible">t/114144688263847941</span></a></p>
GreyNoise<p>🚨 March 12 UPDATE: Grafana Exploitation May Signal Multi-Phase SSRF Attacks. Update + original analysis: <a href="https://www.greynoise.io/blog/new-ssrf-exploitation-surge" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/new-ssrf-exp</span><span class="invisible">loitation-surge</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a></p>
Flipboard Tech Desk<p>ShadowDragon, a contractor for ICE and other government agencies, has developed a tool that lets analysts more easily pull an individual’s publicly available data from a wide array of sites, social networks, apps, and services across the web. <span class="h-card" translate="no"><a href="https://flipboard.com/@404media" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>404media</span></a></span> has the story. <a href="https://flipboard.social/tags/ICE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICE</span></a> <a href="https://flipboard.social/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> <a href="https://flipboard.social/tags/ShadowDragon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShadowDragon</span></a> <a href="https://flipboard.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://flipboard.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://flipboard.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://flip.it/Rjm1ZI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">flip.it/Rjm1ZI</span><span class="invisible"></span></a></p>
AAKL<p>Palo Alto's security advisories include six vulnerabilities. Updated today. </p><p>CVE-2025-0113 Cortex XDR Broker VM: Unauthorized Access to Broker VM Docker Containers <a href="https://security.paloaltonetworks.com/CVE-2025-0113" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">CVE-2025-0113</span></a></p><p>- PAN-SA-2025-0006 Informational Bulletin: Impact of OSS CVEs in PAN-OS <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0006" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">PAN-SA-2025-0006</span></a></p><p>- PAN-SA-2025-0005 GlobalProtect Clientless VPN: Clientless VPN Misconfiguration Allows Cross-Site Attacks <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0005" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">PAN-SA-2025-0005</span></a></p><p>- PAN-SA-2025-0004 Chromium: Monthly Vulnerability Update (February 2025) <a href="https://security.paloaltonetworks.com/PAN-SA-2025-0004" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">PAN-SA-2025-0004</span></a></p><p>- CVE-2024-1135 Impact of CVE-2024-1135 <a href="https://security.paloaltonetworks.com/CVE-2024-1135" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">CVE-2024-1135</span></a></p><p>- CVE-2025-0112 Cortex XDR Agent: Local Windows User Can Disable the Agent <a href="https://security.paloaltonetworks.com/CVE-2025-0112" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">CVE-2025-0112</span></a> <span class="h-card" translate="no"><a href="https://bird.makeup/users/paloaltontwks" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>paloaltontwks</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p>
The Linux Foundation<p>🏅 Already earned the essential certs? Take your career to the next level!</p><p>With 20+ vendor-neutral certifications, you can specialize in:<br>✳️ Cloud &amp; infrastructure observability<br>✳️ Digital trust<br>✳️ Finance<br>✳️ Cybersecurity &amp; more!</p><p>Explore all certifications: 🔗 <a href="https://training.linuxfoundation.org/certification-catalog/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.linuxfoundation.org/c</span><span class="invisible">ertification-catalog/</span></a></p><p><a href="https://social.lfx.dev/tags/CloudNative" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudNative</span></a> <a href="https://social.lfx.dev/tags/DigitalTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalTrust</span></a> <a href="https://social.lfx.dev/tags/Finance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Finance</span></a> <a href="https://social.lfx.dev/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p>