mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#cyberdefense

1 Beitrag1 Beteiligte*r0 Beiträge heute
DEF CON<p>🚨 Swag alert! 🚨 </p><p>Final preparations are underway for <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a> Las Vegas 2025! Take a look below for a sneak preview of this year’s training swag, provided exclusively to students and instructors.</p><p>It’s not too late to sign up. Browse the course offerings and secure your spot today: <a href="https://training.defcon.org/collections/def-con-training-las-vegas-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/collection</span><span class="invisible">s/def-con-training-las-vegas-2025</span></a> </p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/offensivecyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offensivecyber</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
DEF CON<p>Already dreading the post-DEF CON blues? Delay them by staying for <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a>.</p><p>Choose from over 40 courses and spend two or four days learning alongside fellow hackers and cybersecurity professionals.</p><p>Register today to secure your spot: <a href="https://training.defcon.org/lasvegas2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/lasvegas20</span><span class="invisible">25</span></a> </p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://defcon.social/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://defcon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
hackmac<p>Ransomware trifft Hilfsorganisation! Am 23. Mai 2025 wurde die Welthungerhilfe Opfer eines gezielten Ransomware‑Angriffs durch die Cyber‑Gruppierung Rhysida, mit anschließender Datenexfiltration und Veröffentlichung einer Dark‑Web‑Leak‑Seite. Forderung: 20 Bitcoin (ca.1,8 Mio. €), offenbar ohne Verschlüsselung, dafür mit Verkaufsdrohung von Personendaten.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://mastodon.social/tags/Datensicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datensicherheit</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/Welthungerhilfe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Welthungerhilfe</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://mastodon.social/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://mastodon.social/tags/Hackerangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackerangriff</span></a></p><p><a href="https://www.csoonline.com/article/4015421/ransomware-attacke-auf-welthungerhilfe.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/4015421/</span><span class="invisible">ransomware-attacke-auf-welthungerhilfe.html</span></a></p>
Bob Carver<p>The Crystal Ball Meets Cybersecurity<br><a href="https://youtu.be/ud_02W_qenU" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/ud_02W_qenU</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/PredictiveCybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PredictiveCybersecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MachineLearning</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/BehavioralAnalytics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BehavioralAnalytics</span></a> <a href="https://infosec.exchange/tags/FutureOfCybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FutureOfCybersecurity</span></a></p>
FIRST.org<p>🌍 <a href="https://infosec.exchange/tags/FIRSTCON25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIRSTCON25</span></a> is a wrap! What an incredible week in Copenhagen, Denmark with 1,000+ cybersecurity professionals from 100+ countries. The record-breaking attendance demonstrates the critical importance of international partnership in addressing today's complex threat landscape. </p><p>Highlights from our 37th Annual Conference: </p><p>🚀 Launched FIRST CORE initiative with Fortinet <br>🤝 Announced Canada-UK Common Good Cyber Fund <br>🎉 Welcomed Olivier Caleff as new FIRST Chair and Graciela Martinez Giordano to the Board of Directors <br>🏆 Inducted Rich Pethia into our Incident Response Hall of Fame</p><p>📺 Stay tuned - TLP:CLEAR talks will be available on the FIRST YouTube channel later this summer!</p><p>Read more: <a href="https://go.first.org/bFM9v" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">go.first.org/bFM9v</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a><br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
DEF CON<p>More days. More hacking. More Vegas. </p><p>Join us for our first-ever four-day courses this August 9-12. These longer courses will cover more ground, dive deeper, and push you further.</p><p>Las Vegas awaits – sign up today! <br><a href="https://training.defcon.org/lasvegas2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/lasvegas20</span><span class="invisible">25</span></a></p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/defcontraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcontraining</span></a> <a href="https://defcon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://defcon.social/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a></p>
NKCS | NCC-DE<p>🔐 Zeitenwende in der <a href="https://social.bund.de/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> – Eure Expertise ist gefragt! 👉️Meldet euch jetzt an - noch bis zum 03. Juli: <a href="https://www.nkcs.bund.de/de/veranstaltung/nkcs-themenworkshop-zeitenwende-cyber-defense-branche-staerken" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nkcs.bund.de/de/veranstaltung/</span><span class="invisible">nkcs-themenworkshop-zeitenwende-cyber-defense-branche-staerken</span></a></p>
FIRST.org<p>FIRST is honored to be part of the launch of the Common Good Cyber Fund, as recently announced by the Common Good Cyber secretariat!🛡️ </p><p>This groundbreaking initiative will strengthen global cybersecurity by supporting nonprofits that deliver critical services protecting civil society actors at high risk and the Internet as a whole.</p><p>As incident response professionals, we know firsthand how nonprofit organizations serve as the frontline defense for Internet security, yet remain severely underfunded. This fund addresses that critical gap.</p><p>🌍 The impact: Supporting nonprofits that maintain core digital infrastructure and provide cybersecurity assistance to high-risk actors including journalists and human rights defenders.</p><p>🤝 The backing: All G7 Leaders have announced support, with UK and Canada leading joint investment.<br> <br>🎯 Our commitment: FIRST believes in a strong, diverse cybersecurity ecosystem. This fund will provide the long-term support our community needs to make the Internet safe for all.</p><p>Together with the Internet Society, Global Cyber Alliance and fellow secretariat members, we're building a safer digital future for everyone.</p><p>Read more: <a href="https://go.first.org/yHGRp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">go.first.org/yHGRp</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/CommonGoodCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CommonGoodCyber</span></a><br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
No Starch Press<p>Learn how Windows manages authentication, access control, and resource permissions with clarity and precision. </p><p>This book offers hands-on PowerShell examples that guide you through key internals like the Security Reference Monitor, SAM, and Kerberos—ideal for researchers, defenders, and developers.</p><p><a href="https://nostarch.com/windows-security-internals" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/windows-security-</span><span class="invisible">internals</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://mastodon.social/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a></p>
MalwareLab<p>Support for <a href="https://infosec.exchange/tags/STIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>STIX</span></a> and <a href="https://infosec.exchange/tags/TAXII" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TAXII</span></a> in <a href="https://infosec.exchange/tags/IntelMQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IntelMQ</span></a> </p><p>For collecting and processing <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> feeds, <a href="https://infosec.exchange/tags/IntelMQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IntelMQ</span></a> is a good tool. Simple to deploy and configure, used by several <a href="https://infosec.exchange/tags/CSIRT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSIRT</span></a> teams.<br>For long time, it was sufficient for me, however, with recent changes in <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESET</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> feeds, I realized that IntelMQ lacks support for TAXII protocol and STIX language and objects...</p><p>After hours of studying the STIX/TAXII documentation, I decided to develop some basic support for collecting the feeds from TAXII servers and parsing the STIX indicators objects. <br>This way, IntelMQ can process not only the current <a href="https://infosec.exchange/tags/ETI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ETI</span></a> feeds, but also some other sources.</p><p>The commits are currently waiting in pull request in IntelMQ GitHub:<br><a href="https://github.com/certtools/intelmq/pull/2611" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/certtools/intelmq/p</span><span class="invisible">ull/2611</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://infosec.exchange/tags/soc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>soc</span></a> <a href="https://infosec.exchange/tags/siem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>siem</span></a></p>
BSides Boulder<p>💥🖥️ Don't miss Nathan Montierth's <a href="https://infosec.exchange/tags/BSidesBoulder25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesBoulder25</span></a> talk "Navigating the Virtualization Battlefield: A Deep Dive into Hypervisor Attack Vectors", which plans to explore how attackers are breaching hypervisors (think ESXi, Active Directory, and more), and what you can do to fight back! 🛡️💥 </p><p>Organizations globally have embraced virtualization as a way to scale solutions and centralize network management, but if your hypervisor gets popped, it could cost your organization millions. If you run virtualized infrastructure, this one’s mission-critical. <a href="https://infosec.exchange/tags/BSides" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSides</span></a> <a href="https://infosec.exchange/tags/BSidesBoulder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesBoulder</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/VirtualizationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirtualizationSecurity</span></a> <a href="https://infosec.exchange/tags/HypervisorHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HypervisorHacking</span></a> <a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a></p><p>Check out our full schedule at <a href="https://bsidesboulder.org/schedule/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsidesboulder.org/schedule/</span><span class="invisible"></span></a></p><p>Tickets are available for purchase for our 13 June event here: <a href="https://www.eventbrite.com/e/bsides-boulder-2025-registration-1290129274389" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eventbrite.com/e/bsides-boulde</span><span class="invisible">r-2025-registration-1290129274389</span></a></p>
The DefendOps Diaries<p>Microsoft is turning the tide on cyber attacks in Europe with an AI-powered security program that teams up with top agencies. Could this be the breakthrough we need in the fight against state-sponsored digital threats?</p><p><a href="https://thedefendopsdiaries.com/microsofts-european-security-program-a-new-era-in-cyber-defense/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/micros</span><span class="invisible">ofts-european-security-program-a-new-era-in-cyber-defense/</span></a></p><p><a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificialintelligence</span></a><br><a href="https://infosec.exchange/tags/europeansecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>europeansecurity</span></a><br><a href="https://infosec.exchange/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a></p>
Cyberkid<p>🔐 Modern Password Security Threats: Protecting Your Digital Identity 🕵️‍♀️ 🛡️ 🚨</p><p>Cybercriminals use sneaky techniques to crack passwords and gain access to accounts. Here are the most common attacks:</p><p>⚒️ Brute Force – Tries every possible password<br>📖 Dictionary Attack – Uses common words &amp; phrases<br>🌈 Rainbow Table – Cracks password hashes<br>👀 Shoulder Surfing – Spies on you while typing<br>⌨️ Keylogging – Records everything you type<br>🎯 Password Spraying – Tests common passwords on many accounts<br>🎭 Social Engineering – Tricks you into revealing passwords<br>🎣 Phishing – Fake emails &amp; websites steal your login<br>🎟️ Credential Stuffing – Uses leaked passwords from breaches<br>🕵️ Man-in-the-Middle – Intercepts data over networks</p><p>🛡️ Stay Safe! Use strong, unique passwords, enable 2FA, and beware of phishing scams.</p><p>Which attack surprised you the most? Let’s discuss in the comments! ⬇️ </p><p>⚠️ This content is shared strictly for educational and informational purposes only. 📚 All information is provided to help individuals and organizations better protect themselves against security threats. 🔒 The techniques discussed are presented solely to improve awareness and defensive measures, not to facilitate any unauthorized access. ✅</p><p><a href="https://defcon.social/tags/PasswordSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordSecurity</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://defcon.social/tags/SecureAuthentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureAuthentication</span></a> <a href="https://defcon.social/tags/IdentityProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityProtection</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/PhishingAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhishingAwareness</span></a> <a href="https://defcon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://defcon.social/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://defcon.social/tags/DigitalSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSafety</span></a></p>
Bytes Europe<p>Switzerland to expand EU defense ties with new cyber-defense role <a href="https://www.byteseu.com/1041268/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/1041268/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/CirculatedC4isrnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CirculatedC4isrnet</span></a> <a href="https://pubeurope.com/tags/CirculatedDefenseNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CirculatedDefenseNews</span></a> <a href="https://pubeurope.com/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://pubeurope.com/tags/DefenseNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DefenseNews</span></a> <a href="https://pubeurope.com/tags/DnDnr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DnDnr</span></a> <a href="https://pubeurope.com/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a> <a href="https://pubeurope.com/tags/EuropeanUnion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EuropeanUnion</span></a> <a href="https://pubeurope.com/tags/pesco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pesco</span></a> <a href="https://pubeurope.com/tags/Switzerland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switzerland</span></a></p>
BSides Boulder<p>🔍 Detection rules are only as good as the tests behind them. 💡📊 </p><p>Ariel Ropek's <a href="https://infosec.exchange/tags/BSidesBoulder25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesBoulder25</span></a> talk "Incorporating End to End Integration Tests into your Detection Engineering Workflow" will provide a practical guide to moving beyond brittle unit tests and validating detections with full attack simulations. If you're building detection-as-code or maintaining a SIEM, this talk is your blueprint for making sure your alerts fire when it really matters! <a href="https://infosec.exchange/tags/BSides" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSides</span></a> <a href="https://infosec.exchange/tags/BSidesBoulder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesBoulder</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/DetectionEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DetectionEngineering</span></a> <a href="https://infosec.exchange/tags/E2ETesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2ETesting</span></a> <a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a></p><p>Check out our full schedule at <a href="https://bsidesboulder.org/schedule/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsidesboulder.org/schedule/</span><span class="invisible"></span></a></p><p>Tickets are available for purchase for our 13 June event here: <a href="https://www.eventbrite.com/e/bsides-boulder-2025-registration-1290129274389" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eventbrite.com/e/bsides-boulde</span><span class="invisible">r-2025-registration-1290129274389</span></a></p>
Alo Japan<p><a href="https://www.alojapan.com/1277967/japanese-parliament-passes-active-cyber-defense-law/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">alojapan.com/1277967/japanese-</span><span class="invisible">parliament-passes-active-cyber-defense-law/</span></a> Japanese Parliament Passes Active Cyber Defense Law <a href="https://channels.im/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://channels.im/tags/Japan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Japan</span></a> <a href="https://channels.im/tags/JapanNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JapanNews</span></a> <a href="https://channels.im/tags/Japanese" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Japanese</span></a> <a href="https://channels.im/tags/JapaneseNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JapaneseNews</span></a> <a href="https://channels.im/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://channels.im/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://channels.im/tags/OffensiveCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffensiveCyber</span></a> <a href="https://channels.im/tags/regulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regulation</span></a> Cyberwarfare / Nation-State Attacks , Fraud Management &amp; Cybercrime , Geo Focus: Asia New Cyber Law Enables Agencies to Neutralize Attackers’ Servers Located Abroad Jayant Chakravarti (@JayJay_Tech) • May 19, 2025 &nbsp; &nbsp; Japan’s House of Councillors passed the active cyber bill on Friday at th…</p>
Blue Headline - Tech News<p>⏰ Just 24 hours.</p><p>That’s all EU companies now have to report a significant cyber incident under new laws like NIS2.</p><p>This isn’t just red tape—it’s Europe’s attempt to build real-time digital resilience.</p><p>Could your org meet the deadline?</p><p>📖 Read more: <a href="https://blueheadline.com/cybersecurity/24-hours-eu-deadline-cyber-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blueheadline.com/cybersecurity</span><span class="invisible">/24-hours-eu-deadline-cyber-attacks/</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/TechPolicy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechPolicy</span></a> <a href="https://mastodon.social/tags/DigitalRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalRisk</span></a> <a href="https://mastodon.social/tags/BlueHeadline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueHeadline</span></a> <a href="https://mastodon.social/tags/CyberResilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberResilience</span></a> <a href="https://mastodon.social/tags/EURegulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EURegulation</span></a> <a href="https://mastodon.social/tags/NIS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a></p>
DEF CON<p>Friendly reminder: Registration is open for <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a> Las Vegas 2025! Extend your <a href="https://defcon.social/tags/DEFCON33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON33</span></a> experience by registering for a 2-day or 4-day course with our world-class instructors. Act before May 31 and get a $200 <a href="https://defcon.social/tags/earlybird" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>earlybird</span></a> discount!</p><p>Don’t miss out - reserve your spot today! <a href="https://training.defcon.org/collections/def-con-training-las-vegas-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/collection</span><span class="invisible">s/def-con-training-las-vegas-2025</span></a></p><p><a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a> <a href="https://defcon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://defcon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a></p>
Hacker News<p>America's cyber defenses are being dismantled from the inside</p><p><a href="https://www.theregister.com/2025/04/23/trump_us_security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/04/23/tru</span><span class="invisible">mp_us_security/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://mastodon.social/tags/defenses" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defenses</span></a> <a href="https://mastodon.social/tags/are" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>are</span></a> <a href="https://mastodon.social/tags/being" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>being</span></a> <a href="https://mastodon.social/tags/dismantled" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dismantled</span></a> <a href="https://mastodon.social/tags/from" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>from</span></a> <a href="https://mastodon.social/tags/the" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>the</span></a> <a href="https://mastodon.social/tags/inside" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>inside</span></a> <a href="https://mastodon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/nationalsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nationalsecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>"Threat-Informed Defense" isn't just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&amp;CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. <a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://infosec.exchange/tags/MITREATTACK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITREATTACK</span></a> </p><p>Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&amp;CK framework. Precision matters. <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> </p><p>Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. <a href="https://infosec.exchange/tags/SOCtools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOCtools</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> </p><p>TRAM leverages automation to map CTI reports directly to MITRE ATT&amp;CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/MITREATTACK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITREATTACK</span></a> </p><p>Building effective cyber analytics requires depth; "Summiting the Pyramid" delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. <a href="https://infosec.exchange/tags/CyberAnalytics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAnalytics</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/center-for-threat-informed-defense" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/center-for-threat-i</span><span class="invisible">nformed-defense</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>