mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#EndpointSecurity

1 Beitrag1 Beteiligte*r0 Beiträge heute
apfeltalk :verified:<p>Apple macht sich erneut über Windows-Sicherheit lustig – Neuer Werbespot zur CrowdStrike-BSOD-Panne<br>Apple thematisiert die weitverbreitete CrowdStrike-BSOD-Störung in einem neuen Werbespot und rückt damit die Zuverlässig<br><a href="https://www.apfeltalk.de/magazin/news/apple-macht-sich-erneut-ueber-windows-sicherheit-lustig-neuer-werbespot-zur-crowdstrike-bsod-panne/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">apfeltalk.de/magazin/news/appl</span><span class="invisible">e-macht-sich-erneut-ueber-windows-sicherheit-lustig-neuer-werbespot-zur-crowdstrike-bsod-panne/</span></a><br><a href="https://creators.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://creators.social/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheit</span></a> <a href="https://creators.social/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://creators.social/tags/Betriebssysteme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Betriebssysteme</span></a> <a href="https://creators.social/tags/BSOD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSOD</span></a> <a href="https://creators.social/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdStrike</span></a> <a href="https://creators.social/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://creators.social/tags/Falcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Falcon</span></a> <a href="https://creators.social/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://creators.social/tags/macs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macs</span></a> <a href="https://creators.social/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheit</span></a> <a href="https://creators.social/tags/Werbung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Werbung</span></a> <a href="https://creators.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a></p>
Pyrzout :vm:<p>Ransomware attackers used incorrectly stored recovery codes to disable EDR agents <a href="https://www.helpnetsecurity.com/2025/09/16/akira-ransomware-disable-edr/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/09/16</span><span class="invisible">/akira-ransomware-disable-edr/</span></a> <a href="https://social.skynetcloud.site/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a> <a href="https://social.skynetcloud.site/tags/credentials" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>credentials</span></a> <a href="https://social.skynetcloud.site/tags/enterprise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enterprise</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/SonicWall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SonicWall</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Huntress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Huntress</span></a> <a href="https://social.skynetcloud.site/tags/Rapid7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rapid7</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/SMBs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMBs</span></a></p>
Pyrzout :vm:<p>Rowhammer Attack Demonstrated Against DDR5 <a href="https://www.securityweek.com/rowhammer-attack-demonstrated-against-ddr5/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/rowhammer-att</span><span class="invisible">ack-demonstrated-against-ddr5/</span></a> <a href="https://social.skynetcloud.site/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/Rowhammer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rowhammer</span></a> <a href="https://social.skynetcloud.site/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://social.skynetcloud.site/tags/DDR5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDR5</span></a> <a href="https://social.skynetcloud.site/tags/DRAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DRAM</span></a></p>
Pyrzout :vm:<p>Trend Micro Apex One flaws exploted in the wild (CVE-2025-54948, CVE-2025-54987) <a href="https://www.helpnetsecurity.com/2025/08/06/trend-micro-apex-one-flaws-exploted-in-the-wild-cve-2025-54948-cve-2025-54987/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/06</span><span class="invisible">/trend-micro-apex-one-flaws-exploted-in-the-wild-cve-2025-54948-cve-2025-54987/</span></a> <a href="https://social.skynetcloud.site/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/enterprise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enterprise</span></a> <a href="https://social.skynetcloud.site/tags/TrendMicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrendMicro</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/SMBs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMBs</span></a></p>
Pyrzout :vm:<p>Millions of Dell laptops could be persistently backdoored in ReVault attacks <a href="https://www.helpnetsecurity.com/2025/08/05/dell-laptops-firmware-vulnerabilities-revault-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/05</span><span class="invisible">/dell-laptops-firmware-vulnerabilities-revault-attacks/</span></a> <a href="https://social.skynetcloud.site/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Broadcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Broadcom</span></a> <a href="https://social.skynetcloud.site/tags/firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmware</span></a> <a href="https://social.skynetcloud.site/tags/hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardware</span></a> <a href="https://social.skynetcloud.site/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/Dell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dell</span></a></p>
G :donor: :Tick:<p>🚨 OuttaTune — The Microsoft Intune Conditional Access bypass I reported is now officially closed by MSRC (again).</p><p>It began as “By Design”… then was reclassified as a Moderate severity vulnerability… led to a product group meeting… and ultimately forced Microsoft to revise their official Conditional Access guidance.</p><p>Yet now it’s closed - with no fix timeline, no CVE, and no researcher credit. 🤷‍♂️<br>Let’s unpack it. 👇</p><p>⸻</p><p>🔍 The Issue<br>Intune lets you apply Conditional Access policies using device filters - say, “block access to Office 365 from DevBox VMs.”</p><p>But that device model? It’s just a registry key.<br>A local admin can change one line, sync the device, and suddenly it’s not a DevBox anymore. It’s “Compliant.” It’s trusted. It’s in.</p><p>⸻</p><p>🧪 Microsoft’s Initial Response</p><p>“This is by design.”<br>“Assignment filters should be used sparingly.”<br>“Intune cannot accurately lock down a device if an admin on the machine is actively working against management.”</p><p>Wait - imagine Microsoft saying that about Defender for Endpoint:</p><p>“Sorry, if someone has admin, Defender just gives up.”</p><p>Of course they wouldn’t say that. Because security controls must assume hostile actors. Why should Intune be any different?</p><p>⸻</p><p>🛠️ The Outcome<br> • I pushed back, published my findings, and spoke directly with Microsoft’s product teams.<br> • They reclassified the issue as a Moderate security vulnerability.<br> • They changed official documentation to warn against using properties like device.model in isolation.<br>“Microsoft recommends using at least one system defined or admin configurable device property…”</p><p>That change exists because of this research.</p><p>⸻</p><p>📉 But the Case Is Now Closed</p><p>MSRC insists that:</p><p>“This requires admin and knowledge of policy filters, so it remains Moderate.”</p><p>But attackers don’t need to know your exact filters - they can just trial different registry values and sync until they’re in. No alerts. No resistance. No risk of detection unless you’ve layered in custom EDR rules.</p><p>And admin access is table stakes. We can’t keep pretending that post-exploitation scenarios don’t matter.</p><p>⸻</p><p>💬 Final Thoughts</p><p>Conditional Access isn’t just about who you are - it’s supposed to account for where and what you’re accessing from.</p><p>But when enforcement relies on unverified local data, the door isn’t locked. It’s not even shut.<br>We’ve just convinced ourselves that it is.</p><p>🔐 Trust nothing. Validate everything.<br>Even the registry keys your policies depend on.</p><p>⸻</p><p>Blog link: <a href="https://cirriustech.co.uk/blog/outtatune-vulnerability" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cirriustech.co.uk/blog/outtatu</span><span class="invisible">ne-vulnerability</span></a></p><p><a href="https://infosec.exchange/tags/Intune" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intune</span></a> <a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/ConditionalAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConditionalAccess</span></a> <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/OuttaTune" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OuttaTune</span></a> <a href="https://infosec.exchange/tags/M365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>M365</span></a> <a href="https://infosec.exchange/tags/Defender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Defender</span></a> <a href="https://infosec.exchange/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://infosec.exchange/tags/MSRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSRC</span></a> <a href="https://infosec.exchange/tags/SecurityCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityCommunity</span></a></p>
No Starch Press<p>A comprehensive look at EDR systems' inner workings and the real-world tactics employed to circumvent them. Essential information for professionals involved in security operations and threat analysis. </p><p>Grounded in tested techniques—not speculation—and focused on practical tradecraft.</p><p><a href="https://nostarch.com/evading-edr" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nostarch.com/evading-edr</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://mastodon.social/tags/EDRArchitecture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDRArchitecture</span></a> <a href="https://mastodon.social/tags/SecurityOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityOps</span></a></p>
Pyrzout :vm:<p>Breaking the cycle of attack playbook reuse <a href="https://www.helpnetsecurity.com/2025/06/26/breaking-attack-playbook-reuse-cycle-phasr/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/26</span><span class="invisible">/breaking-attack-playbook-reuse-cycle-phasr/</span></a> <a href="https://social.skynetcloud.site/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a> <a href="https://social.skynetcloud.site/tags/Expertanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Expertanalysis</span></a> <a href="https://social.skynetcloud.site/tags/Expertcorner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Expertcorner</span></a> <a href="https://social.skynetcloud.site/tags/Bitdefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitdefender</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
UK<p><a href="https://www.europesays.com/uk/146566/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/146566/</span><span class="invisible"></span></a> IGEL Buys Stratodesk To Boost Endpoint Computing Capabilities <a href="https://pubeurope.com/tags/ApplicationAndPlatformSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApplicationAndPlatformSecurity</span></a> <a href="https://pubeurope.com/tags/CloudPlatforms" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudPlatforms</span></a> <a href="https://pubeurope.com/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://pubeurope.com/tags/CloudSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSoftware</span></a> <a href="https://pubeurope.com/tags/Computing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computing</span></a> <a href="https://pubeurope.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://pubeurope.com/tags/DesktopClients" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DesktopClients</span></a> <a href="https://pubeurope.com/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://pubeurope.com/tags/ManagedSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ManagedSecurity</span></a> <a href="https://pubeurope.com/tags/MergersAndAcquisitions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MergersAndAcquisitions</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/SecurityOperations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityOperations</span></a> <a href="https://pubeurope.com/tags/tablets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tablets</span></a> <a href="https://pubeurope.com/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a></p>
Pyrzout :vm:<p>Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428) <a href="https://www.helpnetsecurity.com/2025/05/13/ivanti-epmm-vulnerabilities-exploited-in-the-wild-cve-2025-4427-cve-2025-4428/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/05/13</span><span class="invisible">/ivanti-epmm-vulnerabilities-exploited-in-the-wild-cve-2025-4427-cve-2025-4428/</span></a> <a href="https://social.skynetcloud.site/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a> <a href="https://social.skynetcloud.site/tags/securityupdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdate</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/CERT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CERT</span></a>-EU <a href="https://social.skynetcloud.site/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Bytes Europe<p>Lookout Announces Sale of Its Cloud Security Business to Fortra <a href="https://www.byteseu.com/1004291/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/1004291/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://pubeurope.com/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://pubeurope.com/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://pubeurope.com/tags/Fortra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortra</span></a> <a href="https://pubeurope.com/tags/Inc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Inc</span></a>. <a href="https://pubeurope.com/tags/Lookout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lookout</span></a> <a href="https://pubeurope.com/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileSecurity</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>New day, new content, more amazing coversation recorded last week at <a href="https://infosec.exchange/tags/RSAC2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSAC2025</span></a> in SF! </p><p>🎙️ <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> isn’t just a buzzword — it’s a real security strategy. In this On Location Brand Story from <a href="https://infosec.exchange/tags/RSAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSAC</span></a> 2025, we explore how ThreatLocker is helping companies proactively build the guardrails they need to truly protect their environments.</p><p>🚀 New Brand Story from RSA Conference 2025: From Reactive to Proactive — Building Guardrails That Actually Protect</p><p>At RSAC Conference 2025, Sean Martin, CISSP and Marco Ciappelli sat down with Rob Allen, Chief Product Officer at ThreatLocker, to discuss how Zero Trust principles, combined with properly enforced controls, are changing the game for proactive cybersecurity.</p><p>🔐 How can organizations move from theory to action with Zero Trust? It starts with gaining visibility and enforcing practical controls that actually work.</p><p>This episode cuts through the noise to show how deny-by-default strategies can simplify defenses and make attackers’ jobs much harder — without making yours more complex.</p><p>Find out how ThreatLocker is helping companies lock down critical assets, anticipate risks, and build stronger, more manageable security frameworks.</p><p>🎙️ Watch, listen, or read the full story here:<br>👉 <a href="https://www.itspmagazine.com/their-stories/from-reactive-to-proactive-building-guardrails-that-actually-protect-a-brand-story-with-rob-allen-from-threatlocker-an-on-location-rsac-conference-2025-brand-story" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/from-reactive-to-proactive-building-guardrails-that-actually-protect-a-brand-story-with-rob-allen-from-threatlocker-an-on-location-rsac-conference-2025-brand-story</span></a></p><p>📌 Learn more about ThreatLocker’s work:<br>👉 <a href="https://www.itspmagazine.com/directory/threatlocker" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/directory/thr</span><span class="invisible">eatlocker</span></a></p><p>🛰️ See all our RSAC 2025 coverage:<br>👉 <a href="https://www.itspmagazine.com/rsac25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/rsac25</span><span class="invisible"></span></a></p><p>🌟 Discover more Brand Stories and Briefings from innovative companies:<br>👉 <a href="https://www.itspmagazine.com/brand-story" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/brand-story</span><span class="invisible"></span></a></p><p>🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.</p><p>Stay tuned for more Brand Stories, Briefings, and candid conversations from RSAC 2025!</p><p>🎤 Looking ahead:<br>If your company would like to share your story with our audiences On Location, we’re gearing up for <a href="https://infosec.exchange/tags/InfosecurityEurope" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfosecurityEurope</span></a> in June and <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> in August!</p><p>⚡ RSAC 2025 sold out fast — we expect the same for these next events.<br>🎯 Reserve your full sponsorship or briefing now: <a href="https://www.itspmagazine.com/purchase-programs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/purchase-prog</span><span class="invisible">rams</span></a></p><p>📲 Hashtags:<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://infosec.exchange/tags/society" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>society</span></a> <a href="https://infosec.exchange/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/proactivesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proactivesecurity</span></a> <a href="https://infosec.exchange/tags/threatlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatlocker</span></a> <a href="https://infosec.exchange/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🎉More Big News! 🎈🎈🎈</p><p>Please join us in welcoming Beachhead Solutions as an official sponsor of ITSPmagazine.</p><p>Beachhead Solutions provides hashtag#cloud-managed device security that enables businesses to enforce hashtag#encryption, control data access remotely, and instantly prove regulatory compliance across all endpoints—PCs, Macs, servers, phones, tablets, and USBs.</p><p>🔗 Explore their brand page on ITSPmagazine:<br><a href="https://lnkd.in/gP2RfpCa" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/gP2RfpCa</span><span class="invisible"></span></a></p><p>📢 Help us spread the word—tag your team, your peers, your fellow defenders.</p><p>Visit Beachhead Solutions Website 👉 <a href="https://itspm.ag/beachhead-solutions-r49e" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">itspm.ag/beachhead-solutions-r</span><span class="invisible">49e</span></a></p><p>Welcome aboard, Beachhead Solutions! ✨ 👏 ✨ 👏 ✨ 👏</p><p>— Sean Martin, CISSP &amp; Marco Ciappelli<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a>,<a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a>,<a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a> <a href="https://infosec.exchange/tags/managedsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>managedsecurity</span></a> <a href="https://infosec.exchange/tags/MSPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSPs</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdStrike</span></a>: Sind EU und Ratingagenturen schuld? [Und: Updates] - Das Netz ist politisch <a href="https://dnip.ch/2024/08/05/crowdstrike-sind-eu-und-ratingagenturen-schuld-und-updates/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2024/08/05/crowdstrike</span><span class="invisible">-sind-eu-und-ratingagenturen-schuld-und-updates/</span></a> <a href="https://social.tchncs.de/tags/DNIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNIP</span></a> <a href="https://social.tchncs.de/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdStrike</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.tchncs.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> :windows: <a href="https://social.tchncs.de/tags/eBPF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eBPF</span></a> <a href="https://social.tchncs.de/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://social.tchncs.de/tags/Risikomanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Risikomanagement</span></a> <a href="https://social.tchncs.de/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://social.tchncs.de/tags/Digitalisierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Digitalisierung</span></a> <a href="https://social.tchncs.de/tags/digitalization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalization</span></a> <a href="https://social.tchncs.de/tags/SecurityFramework" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityFramework</span></a></p>
Pyrzout :vm:<p>5 reasons to double down on network security <a href="https://www.helpnetsecurity.com/2024/12/02/network-security-double-down/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2024/12/02</span><span class="invisible">/network-security-double-down/</span></a> <a href="https://social.skynetcloud.site/tags/endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointsecurity</span></a> <a href="https://social.skynetcloud.site/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://social.skynetcloud.site/tags/Expertanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Expertanalysis</span></a> <a href="https://social.skynetcloud.site/tags/cloudcomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudcomputing</span></a> <a href="https://social.skynetcloud.site/tags/StamusNetworks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StamusNetworks</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Expertcorner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Expertcorner</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://social.skynetcloud.site/tags/opinion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opinion</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Pyrzout :vm:<p>MITRE ATT&amp;CK Coverage by Security Tools Is Inconsistent, Incomplete: Researchers <a href="https://thecyberexpress.com/mitre-attack-coverage-by-security-tools/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/mitre-atta</span><span class="invisible">ck-coverage-by-security-tools/</span></a> <a href="https://social.skynetcloud.site/tags/endpointdetectionandresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpointdetectionandresponse</span></a>(EDR) <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecuritytools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytools</span></a> <a href="https://social.skynetcloud.site/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/MITREATT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITREATT</span></a>&amp;CK <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/SIEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIEM</span></a> <a href="https://social.skynetcloud.site/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a></p>
Thomas Strömberg<p>I realized recently that it's trivial to implement a strace(1) style command for <a href="https://triangletoot.party/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> on top of the <a href="https://triangletoot.party/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> framework.</p><p>I'm just a little confused as to why Apple hasn't done so; I'm not sure I need another <a href="https://triangletoot.party/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> side-quest to go on today, but I do miss having easy access to `ktrace/dtruss`</p>
Pyrzout :vm:<p>7 Security and Compliance Tips From ISC2 Security Congress – Source: www.techrepublic.com <a href="https://ciso2ciso.com/7-security-and-compliance-tips-from-isc2-security-congress-source-www-techrepublic-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/7-security-and-c</span><span class="invisible">ompliance-tips-from-isc2-security-congress-source-www-techrepublic-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/SecurityonTechRepublic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityonTechRepublic</span></a> <a href="https://social.skynetcloud.site/tags/SecurityTechRepublic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityTechRepublic</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Endpointsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Endpointsecurity</span></a> <a href="https://social.skynetcloud.site/tags/thirdpartyrisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thirdpartyrisks</span></a> <a href="https://social.skynetcloud.site/tags/Compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Compliance</span></a> <a href="https://social.skynetcloud.site/tags/ITPolicies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITPolicies</span></a> <a href="https://social.skynetcloud.site/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a>&amp;Work <a href="https://social.skynetcloud.site/tags/ITaudits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITaudits</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a></p>
LINUXexpert.org<p>Zero Trust assumes that threats could be both external and internal, and thus, no entity, whether it is a user, device, or application, should be inherently trusted.</p><p><a href="https://linuxexpert.org/deep-dive-into-zero-trust-security-model/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxexpert.org/deep-dive-into</span><span class="invisible">-zero-trust-security-model/</span></a></p><p><a href="https://mastodon.social/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.social/tags/IAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IAM</span></a> <a href="https://mastodon.social/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://mastodon.social/tags/SSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSO</span></a> <a href="https://mastodon.social/tags/Microsegmentation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsegmentation</span></a> <a href="https://mastodon.social/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://mastodon.social/tags/ApplicationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApplicationSecurity</span></a> <a href="https://mastodon.social/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://mastodon.social/tags/RBAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RBAC</span></a> <a href="https://mastodon.social/tags/LeastPrivilege" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LeastPrivilege</span></a> <a href="https://mastodon.social/tags/AssumeBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AssumeBreach</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
SnoopGod Linux<p>Hacker Busted for 'Evil Twin' Wi-Fi That Steals Airline Passenger Data<br><a href="https://infosec.exchange/tags/ENDPOINTSECURITY" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ENDPOINTSECURITY</span></a> <a href="https://infosec.exchange/tags/REMOTEWORKFORCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>REMOTEWORKFORCE</span></a> <a href="https://infosec.exchange/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://www.darkreading.com/remote-workforce/hacker-busted-for-evil-twin-wi-fi-that-steals-airline-passenger-data" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/remote-workfor</span><span class="invisible">ce/hacker-busted-for-evil-twin-wi-fi-that-steals-airline-passenger-data</span></a></p>