lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

66
active users

#InfoSec

100 posts72 participants8 posts today
Matthias Schulze<p>Trump to sign stablecoin bill that may make it easier to bribe the president <a href="https://arstechnica.com/tech-policy/2025/07/stablecoin-bill-heads-to-trumps-desk-without-blocks-on-presidential-grifting/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/tech-policy/20</span><span class="invisible">25/07/stablecoin-bill-heads-to-trumps-desk-without-blocks-on-presidential-grifting/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:<p>On a call at work with our GRC folks and he dropped some wisdom.</p><blockquote><p>If you have a policy without enforcement, what you have is a suggestion.</p></blockquote><p>The moment was ruined when people on my team started extolling the benefits of negative reinforcement and downplaying positive.</p><p>Dude; there's room for both.</p><p><a href="https://infosec.exchange/tags/GRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRC</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p><a href="https://infosec.exchange/tags/HappyWeekend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HappyWeekend</span></a> — and happy thinking, too. 🤔 🤖</p><p>📚🎙️ The Hybrid Species — When Technology Becomes Human, and Humans Become Technology</p><p>A fresh transmission from my Musing On Society and Technology newsletter:</p><p>We used to build machines to serve us.</p><p>Now we build them to complete us.</p><p>So… what happens when the line between us and them disappears?</p><p>This is the follow-up to my Robbie piece — where <a href="https://infosec.exchange/tags/Asimov" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Asimov</span></a> made us wonder if trust could be earned by a robot that didn’t even speak.</p><p>Well, now the machines do speak. They pretend to understand us. And we pretend they do, too.</p><p>But here’s the twist: maybe we’re not just surrounded by machines — maybe we’re slowly becoming one. Or better yet: when carbon and silicon don’t just coexist, but converge… maybe something new is emerging.</p><p>A hybrid species.</p><p>Not science fiction — just evolution, with a bit of attitude.</p><p>No panic. No utopia either. Just me thinking out loud, wondering what’s coming — and whether we’re wise enough to carry the best of ourselves into whatever comes next.</p><p>No time to read? Let my AI companion TAPE3 read it to you — it’s got a voice and just enough sass to make it weirdly charming.</p><p>👇 Newsletter link and audio version in the comments.</p><p>If you find these musings worth your time, share them with someone who likes to think sideways. And follow both my newsletter and podcast — there’s a lot more where this came from. 🤘😬✨</p><p>Cheers,</p><p>Marco</p><p>ITSPmagazine Sean Martin, CISSP</p><p><a href="https://infosec.exchange/tags/TheHybridSpecies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheHybridSpecies</span></a> <a href="https://infosec.exchange/tags/SocietyAndTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocietyAndTechnology</span></a> <a href="https://infosec.exchange/tags/Asimov" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Asimov</span></a> <a href="https://infosec.exchange/tags/Cyborgs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyborgs</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/genAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>genAI</span></a> <a href="https://infosec.exchange/tags/Future" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Future</span></a> <a href="https://infosec.exchange/tags/Transhumanism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Transhumanism</span></a> <a href="https://infosec.exchange/tags/MarcoCiappelli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MarcoCiappelli</span></a> <a href="https://infosec.exchange/tags/Philosophy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Philosophy</span></a> <a href="https://infosec.exchange/tags/Storytelling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Storytelling</span></a> <a href="https://infosec.exchange/tags/Newsletter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Newsletter</span></a> <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/sociology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sociology</span></a> <a href="https://infosec.exchange/tags/evolution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evolution</span></a> <a href="https://infosec.exchange/tags/science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>science</span></a> <a href="https://infosec.exchange/tags/scifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scifi</span></a> <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://infosec.exchange/tags/utopia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>utopia</span></a> <a href="https://infosec.exchange/tags/dystopia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dystopia</span></a> <a href="https://infosec.exchange/tags/robots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>robots</span></a> <a href="https://infosec.exchange/tags/chatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatGPT</span></a> </p><p><a href="https://www.linkedin.com/pulse/hybrid-species-when-technology-becomes-human-humans-become-ciappelli-iafkc/?trackingId=ynVP%2FWjxQ6%2BoabkmXYev1Q%3D%3D" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/pulse/hybrid-spec</span><span class="invisible">ies-when-technology-becomes-human-humans-become-ciappelli-iafkc/?trackingId=ynVP%2FWjxQ6%2BoabkmXYev1Q%3D%3D</span></a></p>
AAKL<p>Socket, if you missed this: Active Supply Chain Attack: npm Phishing Campaign Leads to Prettier Tooling Packages Compromise <a href="https://socket.dev/blog/npm-phishing-campaign-leads-to-prettier-tooling-packages-compromise" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/npm-phishing-c</span><span class="invisible">ampaign-leads-to-prettier-tooling-packages-compromise</span></a> <span class="h-card" translate="no"><a href="https://fosstodon.org/@SocketSecurity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SocketSecurity</span></a></span> </p><p>More: </p><p>The Hacker News: Malware Injected into 5 npm Packages After Maintainer Tokens Stolen in Phishing Attack <a href="https://thehackernews.com/2025/07/malware-injected-into-6-npm-packages.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/07/malw</span><span class="invisible">are-injected-into-6-npm-packages.html</span></a> <span class="h-card" translate="no"><a href="https://social.tchncs.de/@thehackernews" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>thehackernews</span></a></span> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a></p>
Matthias Schulze<p>Russian alcohol retailer WineLab closes stores after ransomware attack <a href="https://www.bleepingcomputer.com/news/security/russian-alcohol-retailer-winelab-closes-stores-after-ransomware-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/russian-alcohol-retailer-winelab-closes-stores-after-ransomware-attack/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
ʇɐʞlᴉʌƎ 🇺🇦🌈 is rnbwkat<p>What's interesting is that the same bots hit the same WP commercial sites (not honeypots) at least 3-4 times a month, with the same usernames and PWs attempted. Typically about 100-200 times when they hit, rolling across numerous VPSs/VPN connections (which are blocked for 2 days at a time). Do they really expect it to "eventually work"? Or is it a distraction against other attempts in my HP world? It's been going on for about a year now. <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>honeypot</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/wordpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wordpress</span></a></p>
Matthias Schulze<p>UK ties GRU to stealthy Microsoft 365 credential-stealing malware <a href="https://www.bleepingcomputer.com/news/security/uk-ties-russian-gru-to-authentic-antics-credential-stealing-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/uk-ties-russian-gru-to-authentic-antics-credential-stealing-malware/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>

There are no words for how garbage this is. If you currently give money to Amazon in any capacity, please stop.

"Not only is the company reintroducing new versions of old features which would allow police to request footage directly from Ring users, it is also introducing a new feature that would allow police to request live-stream access to people’s home security devices.

[Ring founder Jamie] Siminoff has announced in a memo seen by Business Insider that the company will now be reimagined from the ground up to be “AI first”—whatever that means for a home security camera that lets you see who is ringing your doorbell. We fear that this may signal the introduction of video analytics or face recognition to an already problematic surveillance device."

eff.org/deeplinks/2025/07/amaz

Electronic Frontier Foundation · Amazon Ring Cashes in on Techno-Authoritarianism and Mass SurveillanceRing founder Jamie Siminoff is back at the helm of the surveillance doorbell company, and with him is the surveillance-first-privacy-last approach that made Ring one of the most maligned tech devices. Not only is the company reintroducing new versions of old features which would allow police to...

If the Tech Crunch story about how you should not give AI models any personal data isn't enough, here's more, from yesterday.

Blatantly scraped/stolen without permission: "Thousands of images—including identifiable faces—were found in a small subset of DataComp CommonPool, a major AI training set for image generation scraped from the web."

MIT Tech Review: A major AI training data set contains millions of examples of personal data technologyreview.com/2025/07/1 @mittechreview

Fortune: Leaked Document Reveals Troubling Details About How AI Is Really Being Trained futurism.com/documents-ai-trai @fortune #privacy #AI #cybersecurity #Infosec @IncMagazine

MIT Technology Review · A major AI training data set contains millions of examples of personal dataBy Eileen Guo

Don't give in to these requests.

"TechCrunch found that when Perplexity requests access to a user’s Google Calendar, the browser asks for a broad swath of permissions to the user’s Google Account, including the ability to manage drafts and send emails, download your contacts, view and edit events on all of your calendars, and even the ability to take a copy of your company’s entire employee directory."

Tech Crunch: For privacy and security, think twice before granting AI access to your personal data techcrunch.com/2025/07/19/for- @TechCrunch @zackwhittaker #AI #privacy #cybersecurity #infosec

TechCrunch · For privacy and security, think twice before granting AI access to your personal data | TechCrunch
More from Zack Whittaker

🚨 PoisonSeed phishing kit bypasses FIDO2 by removing secure options from login flows & redirecting users to cloned Microsoft, Google, or Okta pages.

It doesn’t exploit FIDO2—it avoids it.
📌 Experts warn this is part of a broader phishing evolution using social engineering + session hijacking.
🔗 Full article:
technadu.com/seed-of-deceit-po