lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

70
active users

#soc

1 post1 participant0 posts today

Looking forward to learning more about this libre-licensed RISC-V SoC with Kazan GPU and VPU.

crowdsupply.com/libre-risc-v/m

I'm really curious how these types of chips are prototyped. I know we can simulate a few hundred thousand logical operations with an FPGA, but is that even close to simulating a powerful chip of this size?

Crowd SupplyLibre RISC-V M-ClassA 100% libre RISC-V + 3D GPU chip for mobile devices
#riscv#soc#libre

🎯 Free Cybersecurity Webcasts from SANS — Now Open for Registration!

SANS Institute has released its latest schedule of free, expert-led webcasts throughout 2025. Topics span the most critical areas of cybersecurity today:

🔹 Microsoft Defender for Cloud – Best practices & insights
🔹 ICS Security & Management of Change – Resilience and risk
🔹 Threat Intelligence & SOC Trends – Based on global survey data
🔹 Multicloud & GenAI Security – How organizations are adapting
🔹 Attack Surface Management – Stay ahead of hacker tactics

📅 Flexible live or on-demand viewing
🏆 Earn CPE credits
💡 Stay current on the latest in cyber

This is a great opportunity for pros at all levels to grow their skills and stay sharp in a fast-evolving field.

#CyberSecurity #SANS #ProfessionalDevelopment #FreeTraining #ThreatIntel #SOC #CloudSecurity
@sans_isc
@sans_isc@mastodon.social

view.email.sans.org/?qs=69e042

Replied in thread

@whack At the premium #Apple charges for #SOC #storage I never max it out. I also don’t buy into “oh just attach more external disk!” Especially not with a laptop. #Dongles be damned. I’d like to see #NVMe slots added so we have a cheaper onboard option that enables later #expansion without full system swap.

There are aspects to the Apple #ecosystem I love but, despite Apple silicon, it’s getting much harder not to dump them for #Linux on AMD or pick-an-ARM.

Wow, talk about not understanding the assignment.
Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.
#infosec #botnet #BlueTeam #SOC

The world of integrated circuits is a whole lot more interelated than we think;

I got curious about why #Broadcom makes the #SoC for the best-selling #computer of all time and yet they don't make any other consumer computers.

Turns out that the #BCM series of chips is used in lots of other places; network equipment, phones, wearables, set-top boxes, infotainment systems in cars!

There are #RaspberryPis everywhere!

A team I know is hiring a security analyst ( no, really, they are filling the position ) that's actually kind of a mix between analyst and engineering work with some incident response help as needed. Remote and hybrid options are available, but you have to live in Washington State or be willing to move to Washington State. And they're a federal contractor so no weed. Let me know if you have any questions and I'll see if I can help at all.

jobs.pse.com/job/Snoqualmie-Se

jobs.pse.comSenior IT Security AnalystSenior IT Security Analyst

Excited to share a series of periodic articles on the developments of TI Mindmap: 𝐖𝐡𝐚𝐭’𝐬 𝐧𝐞𝐰 𝐢𝐧 𝐓𝐈 𝐌𝐢𝐧𝐝𝐦𝐚𝐩, first issue.
Article and tool co-authored with Oleksiy Meletskiy.

New Features:
➡Extract adversary tactics, techniques, and procedures
➡Tactics, techniques and procedures by execution time
➡Tactics, techniques and procedures timeline
➡AI Chat on your article
➡Mermaid live editor integration
➡PDF report
➡Tweet Mindmap

𝐇𝐨𝐰 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐧𝐯𝐨𝐥𝐯𝐞𝐝
The project is open to external contributions.
To collaborate, please check the GitHub repository: github.com/format81/TI-Mindmap
If you find TI Mindmap useful, please consider starring the repository on GitHub.

To learn more:
medium.com/@antonio.formato/wh

#timindmap #ti #mindmap #threatintelligence #llm #llmapp #openai #azureopenai #largelanguagemodel #cybersecurity #cyber #security #python #streamlit #infer #embedding #chat #ioc #mitre #ttp #cyberreport #report #mermaid #genai #generativeai #cyberthreatintelligence
#github #prompt #promptengineering #FewShotPrompting #gpt #gpt4
#api #DataVisualization #threat #infosec #threatreport #oai #analyst #soc #cert

Some digital evidence sources can prove a positive but cannot prove a negative. 🚀

Let's look at an example...

You want to determine if a user created a file on a specific Windows. To prove that, can you look at LNK files in the Recent Items folder on a Windows system?

You can use LNK files to prove that a user opened a file. When a user creates a file in the GUI, Windows automatically creates an LNK file in the Recent Items folder.

However...

The absence of an LNK file in the Recent Items folder does not mean that the user did not open the file. This evidence source has limitations.

For example...

In most configurations, the Recent Items folder only stores the most recent 149 LNK files it generates and will only store 20 LNK files per unique target file type. Additionally, files created from the command line will not result in the generation of LNK files here.

Therefore, if you don't find a LNK file proving a user created a file, it does not mean they didn't. You'll have to look at other evidence sources.

Much of what analysts do depends on understanding the capabilities and limitations of evidence sources. Many of them can prove an event happened. At the same time, the absence of evidence within those sources cannot always definitely prove the event did not occur.

Join us at InfoSec Jupyterthon 2024.

This online event, to be held on February 15-16, 2024, serves as an opportunity for infosec analysts and engineers to meet and engage with security practitioners using notebooks in their daily work. It is organized by our friends at Open Threat Research, together with folks from the Microsoft Threat Intelligence community.

Some of the topics to be covered in this year’s talks include:

➡ Analyzing Active Directory with Bloodhound CE, Jupyter, and Python

➡Graphing ransomware & data leak sites trends with Plotly

➡Threat hunting in three dimensions

➡Guardians of Identity: OKTA’s underworld

➡Hacking proprietary protocols with pandas

➡Predicting Windows binary download links with Jupyter notebooks

➡Comparison of collaboration methods between MSTICpy and Splunk SIEM

➡Building a community around notebooks for DFIR and SecOps

➡Building data-driven security tools with Streamlit

➡Red teaming LLMs with Jupyter notebooks

➡Automating adversary emulation

➡Applying machine learning for C2 beaconing detection

microsoft.com/en-us/security/b

Microsoft Security Blog · Join us at InfoSec Jupyterthon 2024 | Microsoft Security BlogJupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, […]

hey Fedi, I'm open for some work !
I'm a #floss #3d #b3d multi disciplinary artist with lot's of diverse experiences with interactive projects, #art installations, #simulation #gamedev #vr #godotengine #design #videoediting and #sound but also with #hacking #iot #electronics #soc #arduino and sensors integration, as well as with #cnc #fablab #3dprint I can do some engineering of mechanical pieces, and linux sysadmin

I'm looking for #commissions or pos. in an ethical env. #fedihire #jobs