photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
🌈 An inclusive place for your photos, silliness, and convos! 🌈

Administered by:

Server stats:

253
active users

#networksecurity

1 post1 participant0 posts today
Schneier on Security RSS<p>Poor Password Choices</p><p>Look at this: McDonald’s chose the password “123456” for a major corporate system.... <a href="https://www.schneier.com/blog/archives/2025/08/poor-password-choices.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/08/poor-password-choices.html</span></a></p><p> <a href="https://burn.capital/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a></p>
Pyrzout :vm:<p>10 most powerful cybersecurity companies today <a href="https://www.csoonline.com/article/569075/the-10-most-powerful-cybersecurity-companies.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/569075/t</span><span class="invisible">he-10-most-powerful-cybersecurity-companies.html</span></a> <a href="https://social.skynetcloud.site/tags/IdentityManagementSolutions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagementSolutions</span></a> <a href="https://social.skynetcloud.site/tags/IntrusionDetectionSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IntrusionDetectionSoftware</span></a> <a href="https://social.skynetcloud.site/tags/EndpointProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointProtection</span></a> <a href="https://social.skynetcloud.site/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://social.skynetcloud.site/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://social.skynetcloud.site/tags/AccessControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AccessControl</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a></p>
LMG Security<p>How do attackers go from file shares to full domain admin access without ever stealing a password? In this real-world case study, we'll share how a single misconfiguration opened the door to a full network compromise, and how our <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> team exploited hidden file shares (with that sneaky $ at the end) to uncover sensitive data most IT teams don’t realize is exposed. </p><p>We'll share:<br>• How attackers exploit hidden file shares<br>• Why misconfigured Windows Deployment Services are a major risk<br>• The exact relay attack path that led to domain dominance<br>• What red flags to look for in your environment</p><p>Watch: <a href="https://youtu.be/78L2Zz2Ttbs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/78L2Zz2Ttbs</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/DomainAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainAdmin</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a></p>
The Zeek Network Security Monitor<p>Zeek 8.0 is just around the corner, and we're excited to share pluggable connection keys. You can now customize how Zeek defines a connection beyond the classic 5-tuple. Want to key by VLAN IDs or VXLAN VNIs? You can write your own plugin to do it.</p><p>Find the docs and tutorial here: <a href="https://community.zeek.org/t/zeek-newsletter-issue-52-june-2025/7823#p-29412-pluggable-connection-keys-7" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">community.zeek.org/t/zeek-news</span><span class="invisible">letter-issue-52-june-2025/7823#p-29412-pluggable-connection-keys-7</span></a></p><p><a href="https://infosec.exchange/tags/Zeek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zeek</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://infosec.exchange/tags/NIDS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIDS</span></a> <a href="https://infosec.exchange/tags/Zeek8" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zeek8</span></a></p>
LMG Security<p>Your UPS might be a silent security risk.</p><p>Watch our new video to see how a standard uninterruptible power supply (UPS) became the gateway to hacking a real bank.</p><p>We walk you through:</p><p>▪ How UPS devices connect to networks—and why that matters<br>▪ The danger of default credentials on embedded systems<br>▪ How spoofed email servers let attackers steal domain credentials<br>▪ The exact steps that led to full network compromise</p><p>Watch now! <a href="https://youtu.be/Ru5RR9COqYw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/Ru5RR9COqYw</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/BankHack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BankHack</span></a> <a href="https://infosec.exchange/tags/UPSAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UPSAttack</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Incidentresponse</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@VXShare" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>VXShare</span></a></span> <span class="h-card" translate="no"><a href="https://myside-yourside.net/@StarkRG" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>StarkRG</span></a></span> <span class="h-card" translate="no"><a href="https://social.zerojay.com/@jay" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jay</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@vildis" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vildis</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@vxunderground" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vxunderground</span></a></span> OFC, if their corporate firewall didn't blocklist your domain, most <a href="https://infosec.space/tags/MITM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITM</span></a>-based <em>"<a href="https://infosec.space/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a>"</em> solutions and <em>"<a href="https://infosec.space/tags/EndpointProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointProtection</span></a>"</em> will checksum files and instantly yeet them into the shadow realm.</p><ul><li>Researchers should OFC only run those said malware <em>only for research purposes and on <a href="https://infosec.space/tags/airgapped" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>airgapped</span></a>, sanctioned systems</em> but they need to get their hands on them in the first place.</li></ul><p>And lets be honest: Like with chemistry and medicine, one wants to have a supplier that isn't shady af but actually transparent. </p><ul><li>The "alternative" would be to go into some <em>"dark corners"</em> and risk getting something else entirely.</li></ul>
LMG Security<p>More information on printer security, since they are often a cybersecurity blind spot!</p><p>Last week, we shared a warning about the unpatchable Brother printer vulnerability (CVE-2024-51978) that puts millions of devices at risk. If you haven’t updated your default admin passwords, do it now.</p><p>Since there was a lot of interest in this topic, we're sharing our classic, but still very relevant, on-demand webinar, "How I met your printer": <a href="https://youtu.be/b6d6RO2AFgw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/b6d6RO2AFgw</span><span class="invisible"></span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tompohl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tompohl</span></a></span> shares real-world techniques attackers use to exploit printers for initial access and lateral movement—exactly what we see in our penetration tests all the time.</p><p>If you haven’t tested your print infrastructure, now’s the time. Need help? Our pentest team can assess your network and highlight hidden vulnerabilities.</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/PrinterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrinterSecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <br><a href="https://infosec.exchange/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtesting</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
LMG Security<p>A single misstep in AD CS can hand attackers the keys to your entire domain—no passwords needed.</p><p>If your team installed Active Directory Certificate Services more than six months ago, your organization could be at risk. </p><p>Watch our new 4-minute video to see how a default setting enables low-privilege users to escalate all the way to domain admin and what you can do to reduce your risk. <a href="https://youtu.be/S59dNEPnJ4M" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/S59dNEPnJ4M</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/PrivilegeEscalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivilegeEscalation</span></a> <a href="https://infosec.exchange/tags/ADCS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ADCS</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/DomainAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainAdmin</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a></p>
Leah<p>Hey <a href="https://macaw.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> and <a href="https://macaw.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> folks. My company's conference, LogicON 2025, is coming up in Dublin, OH.</p><p>It's a solid event with practical tracks on compliance, automation, &amp; security ops. Also, you can earn up to 16 CPE credits toward your ISC2 certification renewal.</p><p>No marketing fluff, just good info from fellow engineers &amp; IT leaders. It's a great opportunity to learn something new.</p><p>Check out the agenda and register here: <a href="https://whova.com/portal/registration/f5t5MEwEspy9yLISAyVx/?source=s0mr5tpg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">whova.com/portal/registration/</span><span class="invisible">f5t5MEwEspy9yLISAyVx/?source=s0mr5tpg</span></a></p><p><a href="https://macaw.social/tags/LogicON2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LogicON2025</span></a> <a href="https://macaw.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://macaw.social/tags/ISC2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISC2</span></a> <a href="https://macaw.social/tags/CPE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPE</span></a></p>
LMG Security<p>Ever wonder how hackers really get in?</p><p>We sat down with LMG Security’s Penetration Testing Manager, <span class="h-card" translate="no"><a href="https://infosec.exchange/@tompohl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tompohl</span></a></span>, to get penetration tester secrets from the front lines. From overlooked credentials to forgotten assets, these are the weak spots attackers love—and how to fix them.</p><p>We'll cover:</p><p> • The top entry points that attackers exploit<br> • Real-life examples from professional penetration testers<br> • Actionable tips to eliminate common network vulnerabilities</p><p>Don’t miss this behind-the-scenes breakdown: <a href="https://www.lmgsecurity.com/penetration-tester-secrets-how-hackers-really-get-in/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/penetration-te</span><span class="invisible">ster-secrets-how-hackers-really-get-in/</span></a></p><p><a href="https://infosec.exchange/tags/PenetrationTester" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTester</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a></p>
ACIG<p>🚨 Call for Papers 📢📃</p><p>💡 Submissions for the upcoming volume of Applied Cybersecurity &amp; Internet Governance – an <a href="https://fediscience.org/tags/openAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openAccess</span></a> peer-reviewed journal on <a href="https://fediscience.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and new technologies – are still open!<br>💡 We invite all researchers writing on the technical, political, and legal aspects of new communication technologies, <a href="https://fediscience.org/tags/networkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkSecurity</span></a>, online <a href="https://fediscience.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a>, and cyberwarfare to participate. Learn more at <a href="https://www.acigjournal.com/For-Authors,4555.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">acigjournal.com/For-Authors,45</span><span class="invisible">55.html</span></a> and submit your paper via <a href="https://www.editorialsystem.com/acig" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">editorialsystem.com/acig</span><span class="invisible"></span></a>.<br>💡 We follow the best practices of scientific publishing. Submitted articles undergo double-blind peer review, revision, and resubmission, and the approved research is published free of charge with no delay. ACIG is indexed by leading scientific databases and lists whose number continues to grow; just recently we have been accepted to be included in the Scopus database.</p><p><a href="https://fediscience.org/tags/callForPapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>callForPapers</span></a></p>
dercraig<p>🚀 My new <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> book "DDoS: Understanding Real-Life Attacks and Mitigation Strategies" is now also available as an eBook! 🎉</p><p>Check it out here: <a href="https://ddos-book.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ddos-book.com/</span><span class="invisible"></span></a></p><p>I’ve packed in everything I’ve learned from defending major German government sites against groups like Anonymous, Killnet, and NoName057(16).</p><p>It covers mitigations against <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/crawlers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crawlers</span></a> and many other defenses for all network layers. </p><p>If you find it useful, I’d love it if you could boost and share to help more people defend themselves. ❤️</p><p>Thank you! 🙏</p><p><a href="https://infosec.exchange/tags/DDoSProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoSProtection</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/RealWorldDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RealWorldDefense</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/eBook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eBook</span></a> <a href="https://infosec.exchange/tags/book" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>book</span></a></p>
Kyiv Independent Daily Headlines<p><strong>Sunday, June 1, 2025</strong></p> <p>UK identifies Russia as an ‘immediate and pressing’ threat in new defense review — Ukraine’s enduring cyber defense: Assessing resilience and impact of shifting international support — European leaders shift focus to defending Ukraine without US support — Pompeo urges Trump not to legitimize Russia’s land grabs in Ukraine … and more</p> <p><a href="https://activitypub.writeworks.uk/2025/06/sunday-june-1-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">activitypub.writeworks.uk/2025</span><span class="invisible">/06/sunday-june-1-2025/</span></a></p>
Walt Baldwin<p>Over the past nine months, undocumented communication devices, including cellular radios, have been found in inverters and some batteries from multiple Chinese suppliers.</p><p><a href="https://mastodon.energy/tags/EnergyTransition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnergyTransition</span></a> <a href="https://mastodon.energy/tags/EnergyMastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnergyMastodon</span></a> <a href="https://mastodon.energy/tags/Climate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Climate</span></a> <a href="https://mastodon.energy/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.energy/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.energy/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.energy/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> </p><p><a href="https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reuters.com/sustainability/cli</span><span class="invisible">mate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/</span></a></p>
LMG Security<p>The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.</p><p>Watch the full Cyberside Chats episode to hear <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span> 's insights on:</p><p>🔹 The FBI’s May 2025 alert<br>🔹 TheMoon malware and the Faceless proxy service<br>🔹 What these botnets mean for your enterprise<br>🔹 What you need to do now to stay protected</p><p>🎥 Watch the video: <a href="https://youtu.be/x_40BlvWsHk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/x_40BlvWsHk</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/outdated-routers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/outdated-r</span><span class="invisible">outers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/ProxyAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxyAbuse</span></a> <a href="https://infosec.exchange/tags/TheMoonMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheMoonMalware</span></a> <a href="https://infosec.exchange/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a></p>
LMG Security<p>Think your network is locked down? Think again.</p><p>Register for our May 28th Cyberside Chats Live episode featuring special guest <span class="h-card" translate="no"><a href="https://infosec.exchange/@tompohl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tompohl</span></a></span>, LMG Security’s Head of Penetration Testing, and discover the most common security gaps attackers exploit.</p><p>Tom will share how his team routinely gains domain admin access in over 90% of their engagements—and how you can stop real attackers from doing the same. He’ll break down the weak points they target, from insecure default Active Directory settings to overlooked misconfigurations—even in mature environments.</p><p>Register now: <a href="https://www.lmgsecurity.com/event/cyberside-chats-live-may-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/event/cybersid</span><span class="invisible">e-chats-live-may-2025/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a></p>
Walker<p>When can we declare IP Geo location / country code blocking practically dead as a mitigation strategy?</p><p>Sure it is still useful blocking script kiddies from Iran and other low hanging fruit, but do any serious APT crews actually launch attacks from their home country anymore? </p><p>With the use of zero trust, distributed attack and delivery networks (looking at you Cloudflare), and VPN usage country blocking feels less useful than in the past. </p><p><a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/geoblocking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geoblocking</span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/scriptkiddie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scriptkiddie</span></a> <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a> <a href="https://infosec.exchange/tags/cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudflare</span></a></p>
LMG Security<p>Dive into our new technical blog, No Exploits Needed: Using Cisco’s Own Features to Extract Credentials, for a behind-the-scenes look at how default settings can lead to a data breach.</p><p>In this post, Penetration Testing Team Manager <span class="h-card" translate="no"><a href="https://infosec.exchange/@tompohl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tompohl</span></a></span> shares how he extracted a Cisco router’s entire running configuration—no credentials required—during a recent penetration test and offers tips for hardening your security. <a href="https://www.lmgsecurity.com/no-exploits-needed-using-ciscos-own-features-to-extract-credentials/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/no-exploits-ne</span><span class="invisible">eded-using-ciscos-own-features-to-extract-credentials/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://infosec.exchange/tags/SecurityTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityTesting</span></a></p>
Tailscale<p>At <a href="https://hachyderm.io/tags/RSAC2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSAC2025</span></a>, the message was clear: it's time to move beyond legacy VPNs.</p><p>Discover how Tailscale is leading the charge towards modern, secure networking solutions.</p><p>Read our RSAC 2025 recap:<br>🔗 <a href="https://tailscale.com/blog/rsac-2025-recap" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tailscale.com/blog/rsac-2025-r</span><span class="invisible">ecap</span></a></p><p><a href="https://hachyderm.io/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://hachyderm.io/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://hachyderm.io/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a></p>
D_70WN 🌈 🏳️‍⚧️<p>Nice hardware with power over ethernet, then a decent firmware on openwrt, $sense or something else. <a href="https://chaos.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a> <a href="https://chaos.social/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/poe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>poe</span></a></p>