mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#operationaltechnology

0 Beiträge0 Beteiligte0 Beiträge heute
Pyrzout :vm:<p>Unsophisticated Hackers Targeting ICS/SCADA Systems: CISA <a href="https://thecyberexpress.com/hackers-targeting-ics-scada-systems/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/hackers-ta</span><span class="invisible">rgeting-ics-scada-systems/</span></a> <a href="https://social.skynetcloud.site/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://social.skynetcloud.site/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a> <a href="https://social.skynetcloud.site/tags/energysectorthreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>energysectorthreats</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/CISAICSadvisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISAICSadvisory</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/SCADAsystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SCADAsystems</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://social.skynetcloud.site/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a></p>
hubertf<p>Details 4/4</p><p>Die Kraftwerkbetreiber haben dich kontaktiert, um das Blatt zu wenden. Erlange wieder Admin-Zugang, bevor es zu spät ist. Also ran an die Tastatur, bevor das Licht ausgeht. 💡"</p><p>Mehr: <a href="https://ctf.potsdam-cyber-games.de/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ctf.potsdam-cyber-games.de/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/Blackout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blackout</span></a> <a href="https://mastodon.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/PLC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PLC</span></a> <a href="https://mastodon.social/tags/Unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unix</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://mastodon.social/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
hubertf<p>Details 3/n</p><p>Die Lage spitzt sich zu, Operation Blackout ist aufgeflogen und zwingt HexSwarm zum schnellen Handeln. Sie sind allerdings noch dabei ein letztes Kraftwerk zu infiltrieren, damit die Destabilisierung zu einem vollständigen Blackout führt. Um Zeit zu gewinnen, haben sie die Administratoren ausgesperrt und das Passwort geändert.</p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/Blackout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blackout</span></a> <a href="https://mastodon.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/PLC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PLC</span></a> <a href="https://mastodon.social/tags/Unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unix</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://mastodon.social/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
hubertf<p>Details 2/n</p><p>Nachdem es zunächst so schien als seie nur GridWatch vom benachbarten Stromnetzbetreiber betroffen, hat nun auch ein Kraftwerk Verdacht geschöpft und hat die kompromittierte Schaltzentrale für die PLCs und OT vom Internet getrennt. Doch HexSwarm war vorbereitet: Ein Totmannschalter sorgte für die automatische Abschaltung – erste Instabilitäten im Stromnetz sind bereits spürbar.</p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/Blackout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blackout</span></a> <a href="https://mastodon.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/PLC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PLC</span></a> <a href="https://mastodon.social/tags/Unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unix</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://mastodon.social/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
hubertf<p>Details 1/n</p><p>"Die berüchtigte Hackergruppe HexSwarm plant den ultimativen Sabotageakt: ein koordinierter Angriff auf die Stromversorgung von CyberCity. Mehrere Kraftwerke wurden bereits infiltriert – getarnt als harmlose Wartungstools haben sie Schadprogramme in die Systeme eingenistet.</p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/Blackout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blackout</span></a> <a href="https://mastodon.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/PLC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PLC</span></a> <a href="https://mastodon.social/tags/Unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unix</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://mastodon.social/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
hubertf<p>Hands-On Cybersecurity Übung (nicht nur) für die Energiebranche im Rahmen der Potsdam Cyber Games des Hasso Plattner Institute: Operation Blackout 💡⚡️</p><p>Details in den Kommentaren.</p><p>Mehr: <a href="https://ctf.potsdam-cyber-games.de/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ctf.potsdam-cyber-games.de/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/Blackout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blackout</span></a> <a href="https://mastodon.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/PLC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PLC</span></a> <a href="https://mastodon.social/tags/Unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unix</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://mastodon.social/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
Pen Test Partners<p>The best ICS testing results don’t come from a single approach. Onsite testing has to be risk-averse, and lab testing can uncover deeper vulnerabilities. The key? A combined approach…<br>&nbsp;<br>OT environments don't stand up to regular IT pen testing. Any pen tester that doesn't fully understand that could easily destroy systems and take out critical infrastructure.<br>&nbsp;<br>By strategically selecting devices for lab testing based on onsite insights, you get the best of both worlds without unnecessary risk or cost.<br>&nbsp;<br>In our latest blog, Head of Hardware Andrew Tierney explains how this method finds hidden threats in ICS networks: <a href="https://www.pentestpartners.com/security-blog/ics-testing-best-results-hint-blend-your-approach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/ics-testing-best-results-hint-blend-your-approach/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/icsmonitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icsmonitoring</span></a> <a href="https://infosec.exchange/tags/industrialsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industrialsecurity</span></a> <a href="https://infosec.exchange/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/cyberawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberawareness</span></a></p>
Fraunhofer FOKUS<p>Danke an alle Vortragenden für die spannenden Einblicke, danke an alle Gäste für das Interesse und die lebhaften Diskussionen. Und vielen Dank an die Aussteller, die es möglich gemacht haben, dass die Pausen zwischen den Vorträgen mit den Live-Demos so lebendig gestaltet wurden und wir uns wertvolle Informationen an den verschiedenen Marktständen holen konnten. </p><p>▶️ <a href="https://elite-projekt.de/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">elite-projekt.de/</span><span class="invisible"></span></a></p><p><a href="https://social.bund.de/tags/Mittelstand" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mittelstand</span></a><br><a href="https://social.bund.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a><br><a href="https://social.bund.de/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
ADMIN magazine<p>Principles of Operational Technology Cyber Security released by NSA, Australian Signals Directorate, CISA, and other government organizations<br><a href="https://www.admin-magazine.com/News/Six-Principles-of-Operational-Technology-Cybersecurity-Released" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/News/Six-Pr</span><span class="invisible">inciples-of-Operational-Technology-Cybersecurity-Released</span></a><br><a href="https://hachyderm.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://hachyderm.io/tags/infrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infrastructure</span></a> <a href="https://hachyderm.io/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a> <a href="https://hachyderm.io/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://hachyderm.io/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> <a href="https://hachyderm.io/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://hachyderm.io/tags/SuppyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SuppyChain</span></a></p>
Claudius Link<p>Question <a href="https://infosec.exchange/tags/BoostWelcome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BoostWelcome</span></a></p><p><a href="https://infosec.exchange/tags/5g" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5g</span></a> for <a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a>/ <a href="https://infosec.exchange/tags/Manufacturing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Manufacturing</span></a> is a big topic. And i don't (completely?) get it 🤔</p><p>I find it hard to separate the marketing blah (basically 5g solves everything) from real information. </p><p>One thing i understand, 5g brings low latency and high throughout ✅</p><p>But, the first question I can't find definite information on: <br>Are we talking about private 5g networks or is it using the standard 5g networks by the mobile providers? </p><p>And depending on the answer, there are a lot of follow up questions</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/fedipower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedipower</span></a> <a href="https://infosec.exchange/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a></p>
ITSEC News<p>Spotlight Podcast: OT Is Under Attack. Now What? - Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat la... <a href="https://feeds.feedblitz.com/~/898958480/0/thesecurityledger~Spotlight-Podcast-OT-Is-Under-Attack-Now-What/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">feeds.feedblitz.com/~/89895848</span><span class="invisible">0/0/thesecurityledger~Spotlight-Podcast-OT-Is-Under-Attack-Now-What/</span></a> <a href="https://schleuss.online/tags/industrialcontrolsystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industrialcontrolsystems</span></a>(ics) <a href="https://schleuss.online/tags/operationaltechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnologies</span></a> <a href="https://schleuss.online/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://schleuss.online/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a> <a href="https://schleuss.online/tags/operationalsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationalsecurity</span></a> <a href="https://schleuss.online/tags/internetofthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetofthings</span></a> <a href="https://schleuss.online/tags/directdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>directdefense</span></a> <a href="https://schleuss.online/tags/rsaconference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsaconference</span></a> <a href="https://schleuss.online/tags/technologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technologies</span></a> <a href="https://schleuss.online/tags/cisocloseup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisocloseup</span></a> <a href="https://schleuss.online/tags/conferences" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conferences</span></a> <a href="https://schleuss.online/tags/volttyphoon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>volttyphoon</span></a> <a href="https://schleuss.online/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://schleuss.online/tags/topstories" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>topstories</span></a></p>
Martin Boller 🇬🇱 🇺🇦 :tux: :freebsd: :windows: :mastodon:<p>Promising tool<br><a href="https://github.com/cisagov/parsnip" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/cisagov/parsnip</span><span class="invisible"></span></a></p><p>Parsnip is a program developed to assist in the parsing of protocols using the open source network security monitoring tool Zeek. Parsnip is specifically designed to be applied towards developing Industrial Control Systems (ICS) protocol parsers but can be applied to any protocol.<br><a href="https://infosec.exchange/tags/Parsnip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Parsnip</span></a> <a href="https://infosec.exchange/tags/ProtocolParser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtocolParser</span></a> <a href="https://infosec.exchange/tags/Zeek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zeek</span></a> <a href="https://infosec.exchange/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://infosec.exchange/tags/IndustrialControlSystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IndustrialControlSystems</span></a> <a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://infosec.exchange/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a> <a href="https://infosec.exchange/tags/SCADA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SCADA</span></a></p>
ITSEC News<p>Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk - In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of ... <a href="https://feeds.feedblitz.com/~/896707298/0/thesecurityledger~Spotlight-Podcast-CSO-Chris-Walcutt-on-Managing-rd-Party-OT-Risk/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">feeds.feedblitz.com/~/89670729</span><span class="invisible">8/0/thesecurityledger~Spotlight-Podcast-CSO-Chris-Walcutt-on-Managing-rd-Party-OT-Risk/</span></a> <a href="https://schleuss.online/tags/operationaltechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnologies</span></a> <a href="https://schleuss.online/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://schleuss.online/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a> <a href="https://schleuss.online/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> <a href="https://schleuss.online/tags/internetofthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetofthings</span></a> <a href="https://schleuss.online/tags/directdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>directdefense</span></a> <a href="https://schleuss.online/tags/technologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technologies</span></a> <a href="https://schleuss.online/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://schleuss.online/tags/topstories" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>topstories</span></a> <a href="https://schleuss.online/tags/companies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>companies</span></a> <a href="https://schleuss.online/tags/spotlight" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spotlight</span></a> <a href="https://schleuss.online/tags/interview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>interview</span></a> <a href="https://schleuss.online/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://schleuss.online/tags/china" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>china</span></a></p>
ADMIN magazine<p>New fact sheet from the NSA provides recommendations for reducing cybersecurity risks in open source software <a href="https://www.admin-magazine.com/News/NSA-Offers-Best-Practices-for-OSS-in-Operational-Technology" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/News/NSA-Of</span><span class="invisible">fers-Best-Practices-for-OSS-in-Operational-Technology</span></a> <a href="https://hachyderm.io/tags/OSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSS</span></a> <a href="https://hachyderm.io/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> <a href="https://hachyderm.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://hachyderm.io/tags/patch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patch</span></a> <a href="https://hachyderm.io/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/authorization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authorization</span></a> <a href="https://hachyderm.io/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://hachyderm.io/tags/OperationalTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationalTechnology</span></a> <a href="https://hachyderm.io/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a></p>
fedops 💙💛<p>What is the most unlikely place to find <a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> and <a href="https://fosstodon.org/tags/zfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zfs</span></a> do you think?</p><p><a href="https://www.beckhoff.com/en-en/products/ipc/software-and-tools/twincat-bsd/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">beckhoff.com/en-en/products/ip</span><span class="invisible">c/software-and-tools/twincat-bsd/</span></a></p><p><a href="https://fosstodon.org/tags/IndustrialIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IndustrialIT</span></a> <a href="https://fosstodon.org/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a></p>