lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

69
active users

#pentesting

0 posts0 participants0 posts today
0x40k<p>Seriously, Broadcom... what's the deal lately? 🤯</p><p>First up, we've got CVE-2025-22230 hitting VMware Tools for Windows. This nasty bug basically lets standard users inside a VM escalate their privileges to admin level. Yikes! 😬 With a CVSS score of 7.8, you'll want to jump on this fix ASAP. It impacts versions 11.x.x and 12.x.x, so upgrading to 12.5.1 needs to be right at the top of your list!</p><p>But wait, there's more. CrushFTP is also sounding the alarm about unauthenticated access vulnerabilities lurking on HTTP(S) ports in versions 10 and 11. It's definitely time to double-check those DMZ configurations. Rapid7 has confirmed that exploits are out there, allowing unauthorized access. Pretty intense, right?</p><p>Stuff like this is a stark reminder: while automated scans have their place, they just don't cut it alone. Real-deal penetration testing is absolutely essential. Those manual checks are what uncover the sneaky issues that automated tools often breeze right past.</p><p>What's your take on this recent wave? How are you keeping your own environments locked down tight? Let's talk 👇</p><p><a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityManagement</span></a></p>
Florian<p>When I started the IC_Null channel the idea was to cover topics primarily about <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a>, <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a>, <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> etc. from a <a href="https://infosec.exchange/tags/blind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blind</span></a> perspective. Blind as in <a href="https://infosec.exchange/tags/screenReader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>screenReader</span></a> user, that is. But an overarching topic is showing off what jobs are (up to a point) doable for this demographic and where the obstacles are. Today's stream leans that way: we'll be looking at the premier <a href="https://infosec.exchange/tags/translation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>translation</span></a> and <a href="https://infosec.exchange/tags/localization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>localization</span></a> tool, Trados Studio. Supposedly they have upped their <a href="https://infosec.exchange/tags/accessibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>accessibility</span></a> as of late. I'll be the judge of that 💀<br>I'll see you all on <a href="https://infosec.exchange/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> and <a href="https://infosec.exchange/tags/twitch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twitch</span></a> just under 1.5 hours from now. https://twitch.tvic_null <a href="https://youtube.com/@blindlyCoding" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/@blindlyCoding</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/selfPromo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfPromo</span></a> <a href="https://infosec.exchange/tags/stream" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stream</span></a> <a href="https://infosec.exchange/tags/trados" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trados</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>New On Location Coverage with Sean &amp; Marco on ITSPmagazine</p><p>🚨 Cybersecurity in <a href="https://infosec.exchange/tags/Italy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Italy</span></a> 🇮🇹 : A Niche Topic No More... 🤔 </p><p>Not too long ago, if you mentioned <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> in Italy, you’d get a lot of blank stares. Today, it’s everywhere—boardrooms, government agencies, and, of course, <a href="https://infosec.exchange/tags/ITASEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITASEC</span></a>, Italy’s official cybersecurity conference.</p><p>This year, <a href="https://infosec.exchange/tags/ITASEC2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITASEC2025</span></a> took over Bologna, bringing together researchers, policymakers, and industry leaders to discuss what’s next for digital security. AI security, regulatory shifts, <a href="https://infosec.exchange/tags/cybereducation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybereducation</span></a> — yes, even the Digital Operational Resilience Act (<a href="https://infosec.exchange/tags/DORA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DORA</span></a>) that’s reshaping financial sector security—were all on the table.</p><p>Unfortunately I wasn’t in Italy at the time of the event, but that didn’t stop me from having a fascinating conversation with Professor Alessandro Armando, one of the key organizers and a leading voice in cybersecurity research. In this latest On Location episode. Of course, Sean Martin joined me and we spoke about:</p><p>🔹 How cybersecurity went from an afterthought to a national priority in Italy</p><p>🔹 Why companies are (finally) realizing that <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> is an <a href="https://infosec.exchange/tags/investment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>investment</span></a>, not just a cost</p><p>🔹 The rise of Cyber Challenge IT—Italy’s initiative to build the next generation of cybersecurity experts</p><p>🔹 And, of course, the big reveal… ITASEC 2026 is heading to Sardinia!</p><p>📺 Watch the Full Video: <a href="https://youtu.be/NsdkYAYZANc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/NsdkYAYZANc</span><span class="invisible"></span></a></p><p>🎧 Listen to the Full Podcast: <a href="https://eventcoveragepodcast.com/episodes/cybersecurity-in-italy-itasec-2025-recap-future-outlook-with-professor-alessandro-armando-on-location-coverage-with-sean-martin-and-marco-ciappelli" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eventcoveragepodcast.com/episo</span><span class="invisible">des/cybersecurity-in-italy-itasec-2025-recap-future-outlook-with-professor-alessandro-armando-on-location-coverage-with-sean-martin-and-marco-ciappelli</span></a></p><p>🔔 Subscribe to On Location Podcast: <a href="https://eventcoveragepodcast.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">eventcoveragepodcast.com</span><span class="invisible"></span></a></p><p>Cybersecurity isn’t just about stopping threats—it’s about shaping the future of how we live, work, and trust <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a>.</p><p>What’s your take? Are we heading in the right direction, or are we still playing catch-up? </p><p><a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberRisk</span></a>, <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIsecurity</span></a>, <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreats</span></a>, <a href="https://infosec.exchange/tags/CyberEducation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberEducation</span></a>, <a href="https://infosec.exchange/tags/CyberWorkforce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberWorkforce</span></a>, <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a>, <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a>, <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTesting</span></a>, <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RiskManagement</span></a>, <a href="https://infosec.exchange/tags/CyberResilience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberResilience</span></a>, <a href="https://infosec.exchange/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a>, <a href="https://infosec.exchange/tags/DigitalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalSecurity</span></a>, <a href="https://infosec.exchange/tags/CyberLaw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberLaw</span></a>, <a href="https://infosec.exchange/tags/TechnologyNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechnologyNews</span></a>, <a href="https://infosec.exchange/tags/OnLocationPodcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnLocationPodcast</span></a></p>
0x40k<p>Alright, Go developers, listen up! 🚨 Seriously crazy stuff is happening in the Go world right now. We're talking major typosquatting issues. Attackers are slithering in and spreading malware via fake packages, can you believe it?</p><p>So, for goodness sake, pay super close attention to the names of your modules! One little typo and bam! You've got yourself a nasty infection. As a pentester, I see this kind of thing all the time, sadly. Tiny mistakes, HUGE consequences. This malware then installs a backdoor. Totally not cool, right?</p><p>Therefore, check your imports, folks! And make sure you're getting your devs trained up on security. Automated scans? Nice to have, sure, but they're absolutely no substitute for a manual pentest! What are your go-to tools for fighting this kind of attack? Oh, and yeah, IT security *has* to be in the budget, that's just the way it is.</p><p><a href="https://infosec.exchange/tags/golang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>golang</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/typosquatting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>typosquatting</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>
Konstantin :C_H:<p>I'm excited to share CVE Crowd's Top 5 Vulnerabilities from February 25!</p><p>These five stood out among the 352 CVEs actively discussed across the Fediverse.</p><p>For each CVE, I’ve included a standout post from the community.</p><p>Enjoy exploring! 👇</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CveCrowd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CveCrowd</span></a></p>
0x40k<p>Hey everyone, what's cooking in the open-source universe? 🤯 I just stumbled upon something that's seriously mind-blowing.</p><p>So, there's this Python library pretending to be a music tool (automslc), but get this – it's actually illegally downloading songs from Deezer! And the worst part? It turns your computer into an accomplice in a huge music piracy operation. Seriously, a digital pirate cove. 🏴‍☠️</p><p>And then there's this npm saga with @ton-wallet/create... Crypto wallet emptied, just like that! 💸</p><p>The moral of the story? Open source rocks, but blindly trusting everything is a recipe for disaster. Always double-check those dependencies! Automated scans are cool, but a real penetration test? That's pure gold. 🥇</p><p>Clients are always so appreciative when we can spot and fix this kind of stuff beforehand!</p><p>Now, I'm curious: What are your go-to methods for keeping your codebase squeaky clean and secure? Any tips or tricks you'd like to share?</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a></p>
Python Weekly 🐍<p>I made my own RAT, written entirely in python.</p><p><a href="https://github.com/lioen-dev/Lo4f-Malware/tree/main" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/lioen-dev/Lo4f-Malw</span><span class="invisible">are/tree/main</span></a></p><p>Discussions: <a href="https://discu.eu/q/https://github.com/lioen-dev/Lo4f-Malware/tree/main" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discu.eu/q/https://github.com/</span><span class="invisible">lioen-dev/Lo4f-Malware/tree/main</span></a></p><p><a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a></p>
Karsten Johansson<p>True Story, bruh:</p><p>Back in the 90's people would go on about how superior emacs is as an editor. And some cheerleaders would hound me about why I "still" used (and still do today) vi... vim actually. Even for doing things like Usenet news, and the email client. Joe was in a lot of email readers, which is pretty much slobberproof, BUT...</p><p>My answer was and still is simple. I hack and break things for a living. I've never seen emacs installed on a bridge, router, or frankly any other network device. Hell, when the web came around, emacs was only rarely on those servers, either. But ed and vi is (was?) on pretty much all of them.</p><p>So that's what I learned. And my personal ecosystem and workflow is all about vi(m) and nothing about emacs.</p><p>Even though I'm a Lisp cheerleader, lol.</p><p>Do I hate emacs? No, but I do very much dislike the overpowering smell of religion that seems permeate it's very existence, like those dirty air lines fuming from the Peanuts character Pigpen.</p><p>Some call me a space cowboy. Some call me a gangsta of <a href="https://infosec.exchange/tags/Lisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lisp</span></a> :ablobdj: </p><p><a href="https://infosec.exchange/tags/commonlisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commonlisp</span></a> <a href="https://infosec.exchange/tags/vi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vi</span></a> <a href="https://infosec.exchange/tags/emacs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>emacs</span></a> <a href="https://infosec.exchange/tags/vim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vim</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/editor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>editor</span></a> <a href="https://infosec.exchange/tags/clisp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clisp</span></a> <a href="https://infosec.exchange/tags/sbcl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sbcl</span></a></p>
nickbearded<p>The website is live!</p><p><a href="https://www.bashcore.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bashcore.org/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/bashcore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bashcore</span></a> <a href="https://mastodon.social/tags/cli" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cli</span></a> <a href="https://mastodon.social/tags/nogui" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nogui</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://mastodon.social/tags/education" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>education</span></a> <a href="https://mastodon.social/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a></p>
Marek Alexa :verified:<p>Vlog #2 documenting my journey into pentesting as a <a href="https://techhub.social/tags/ccna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ccna</span></a>. In this video<br>I'm sharing what pentesting report is different phases of pentesting.</p><p><a href="https://youtu.be/Olmgc_MDg64?si=9iT37COsToQepqs1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/Olmgc_MDg64?si=9iT37C</span><span class="invisible">OsToQepqs1</span></a></p><p><a href="https://techhub.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://techhub.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://techhub.social/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://techhub.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://techhub.social/tags/youtube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>youtube</span></a> <a href="https://techhub.social/tags/vlog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vlog</span></a></p>
Bill<p>Microsoft's own red team looked at all of their AI products.</p><p>Conclusions: we fucked.</p><p><a href="https://www.theregister.com/2025/01/17/microsoft_ai_redteam_infosec_warning/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/01/17/mic</span><span class="invisible">rosoft_ai_redteam_infosec_warning/</span></a></p><p><a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
Vasileiadis A. (Cyberkid)<p>Top Interactive Malware Sandboxes ☣️</p><p>🔖<a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
FluConf<p>We are seeking proposals for the security and reverse-engineering track of <a href="https://social.cryptography.dog/tags/fluConf2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fluConf2025</span></a>. While we expect considerable overlap between these topics and those of our privacy and surveillance track, we want to highlight the many ways in which security research differs from privacy.</p><p>Consider submitting proposals for blog articles, presentations, or other formats on any of the following themes:</p><p>* approaches for incorporating security requirements into the software development lifecycle</p><p>* advocacy against stalkerware, resources for personal safety training</p><p>* honeypots, intrusion detection, and monitoring</p><p>* dependency management and static analysis</p><p>* research into cryptographic primitives, sidechannel attacks, and data exfiltration</p><p>* penetration testing and offensive security</p><p>* responsible disclosure, security policies, and related legal issues</p><p>* ransomware gangs, APTs, and other threat actors in the wild</p><p>Apply up until midnight of January 19th, 2025 (anywhere on Earth)</p><p><a href="https://fluconf.online/apply/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fluconf.online/apply/</span><span class="invisible"></span></a></p><p><a href="https://social.cryptography.dog/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://social.cryptography.dog/tags/openSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSource</span></a> <a href="https://social.cryptography.dog/tags/dataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataProtection</span></a> <a href="https://social.cryptography.dog/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.cryptography.dog/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://social.cryptography.dog/tags/blueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueTeam</span></a> <a href="https://social.cryptography.dog/tags/redTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redTeam</span></a> <a href="https://social.cryptography.dog/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://social.cryptography.dog/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://social.cryptography.dog/tags/secOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secOps</span></a> <a href="https://social.cryptography.dog/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a> <a href="https://social.cryptography.dog/tags/cyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberSecurity</span></a> <a href="https://social.cryptography.dog/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://social.cryptography.dog/tags/threatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatIntel</span></a> <a href="https://social.cryptography.dog/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://social.cryptography.dog/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseEngineering</span></a> <a href="https://social.cryptography.dog/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a></p>
Vasileiadis A. (Cyberkid)<p>Top Tools Used in Kali 🐉</p><p>🔖<a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> </p><p>👥t.me/infosec101<br>👤t.me/VasileiadisAnastasis<br>👤<a href="https://whatsapp.com/channel/0029VawRDhh1XquXkmIpie3S" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">whatsapp.com/channel/0029VawRD</span><span class="invisible">hh1XquXkmIpie3S</span></a></p>
phillip<p>I'm looking for more mutuals, please interact/follow If you like any of the following:</p><ul><li><a href="https://infosec.exchange/tags/Movies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Movies</span></a> ( especially <a href="https://infosec.exchange/tags/horror" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>horror</span></a> )</li><li><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> / <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a></li><li><a href="https://infosec.exchange/tags/F1" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>F1</span></a></li><li><a href="https://infosec.exchange/tags/Bitcoin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bitcoin</span></a></li><li><a href="https://infosec.exchange/tags/Cats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cats</span></a></li><li><a href="https://infosec.exchange/tags/PKM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKM</span></a> ( <a href="https://infosec.exchange/tags/Obsidian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obsidian</span></a>, <a href="https://infosec.exchange/tags/Notion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Notion</span></a>, etc. )</li><li><a href="https://infosec.exchange/tags/Running" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Running</span></a></li><li><a href="https://infosec.exchange/tags/Puzzles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Puzzles</span></a></li><li><a href="https://infosec.exchange/tags/Books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Books</span></a></li><li><a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></li><li><a href="https://infosec.exchange/tags/Gaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gaming</span></a> ( <a href="https://infosec.exchange/tags/SteamDeck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SteamDeck</span></a> ftw )</li><li><a href="https://infosec.exchange/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a></li><li><a href="https://infosec.exchange/tags/Keebs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keebs</span></a></li><li>Anything geeky, really</li></ul><p>Boost please!</p>
SecBSD<p>We’re back with even more power!</p><p>After a period of intense work, our team is back to share a new snapshot of our <a href="https://exquisite.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> based operating system.<br>This latest release includes major security updates and improvements.</p><p>Download: <a href="https://mirror.secbsd.org/pub/SecBSD/snapshots/amd64" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mirror.secbsd.org/pub/SecBSD/s</span><span class="invisible">napshots/amd64</span></a></p><p>Donations and Hardware Update:<br>We’re excited to announce that we’ve made several hardware upgrades to improve building times.<br>Thanks to the generous donations from our collaborators, we’ve integrated new components that will help us continue our mission of building a robust and secure system:</p><p>Donation from <span class="h-card" translate="no"><a href="https://bsd.network/@mnour" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mnour</span></a></span> of €40 May, €40 Jun, €40 Jul to help <a href="https://exquisite.social/tags/SecBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecBSD</span></a> developers<br>Donation from <span class="h-card" translate="no"><a href="https://exquisite.social/@Banshee" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Banshee</span></a></span> of €679 to cover electricity costs for one year and Koblenz surge protector<br>Donation from <span class="h-card" translate="no"><a href="https://exquisite.social/@h3artbl33d" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>h3artbl33d</span></a></span> Laptop for testing and domain/email/hosting costs<br>Donation from <span class="h-card" translate="no"><a href="https://social.laylo.nl/u/laylo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>laylo</span></a></span> and <span class="h-card" translate="no"><a href="https://bsd.network/@OpenBSDAms" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OpenBSDAms</span></a></span> Servers for SecBSD infra<br>Donation from purplerain of €600 to cover Internet services for one year and AMD Ryzen 7, 32GB module and 480GB SSD</p><p>Ports Updates:<br>Here’s a quick list of what’s been updated:</p><p>binwalk 3.1.0<br>chronos 2.0.0<br>gitea 1.22.6<br>gitleaks 8.22.0<br>gurk 0.5.2<br>ligolo-ng 0.7.4<br>mattermost 10.1.6<br>veilid 0.4.1<br>zaproxy 2.15.0</p><p><a href="https://exquisite.social/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a> <a href="https://exquisite.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://exquisite.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://exquisite.social/tags/Veilid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Veilid</span></a> <a href="https://exquisite.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://exquisite.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://exquisite.social/tags/RUNBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RUNBSD</span></a></p>
Vasileiadis A. (Cyberkid)<p>Top Μalware Analysis Tools ☣️</p><p>📱My Social Accounts: beacons.ai/cyberkid1987 </p><p>🔖<a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
joschi<p>If your "pentest" includes phishing mails sent to employees with email headers pointing out that you're doing a phishing test, you're doing it wrong.</p><p>Sending phishing mails to employees as part of a pentest is also wrong in the first place.</p><p><a href="https://hachyderm.io/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://hachyderm.io/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a></p>
Tinker ☀️<p>Soooooo I found a massive vulnerability today, the day before Thanksgiving. </p><p>Buuuuuuut it's looks like its existed for a couple of years.</p><p>So, should I report it RIGHT NOW!!!! The day before thanksgiving? Or wait until next week.</p><p>On one hand, they'll have to react to it as its huge. And it could interrupt their time with family and a major holiday.</p><p>On the other hand, it's been around for so long, what's another couple of days going to change anything?</p><p>On the third hand, if this gets exploited over the holiday weekend, it's on me and could affect even more people.</p><p>Hmmmmmmm.... choices choices. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/risk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>risk</span></a></p>
Vasileiadis A. (Cyberkid)<p>Cybersecurity Tools by Category ⚔️</p><p>🔖<a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> </p><p>👥t.me/infosec101<br>👤t.me/VasileiadisAnastasis</p>