mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#secops

0 Beiträge0 Beteiligte0 Beiträge heute
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>What blows my mind: the owner *already* split their hoard into neat 10k <a href="https://mastodon.social/tags/BTC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BTC</span></a> wallets back in 2011—years before “address hygiene” or dust-attack talk. That forward-thinking <a href="https://mastodon.social/tags/OPSEC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPSEC</span></a> means today’s chain-analysis can’t easily link the full ~80K BTC cache.</p><p><a href="https://www.coindesk.com/markets/2025/07/04/bitcoin-whales-wake-up-from-14-year-slumber-to-move-over-usd2b-of-btc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">coindesk.com/markets/2025/07/0</span><span class="invisible">4/bitcoin-whales-wake-up-from-14-year-slumber-to-move-over-usd2b-of-btc</span></a></p><p><a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cryptowallet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptowallet</span></a> <a href="https://mastodon.social/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a></p>
urig✔️<p>I think this is brilliant: </p><p>Truffle Security reports that Sharon Brizinov, a white-hat hacker, scanned all of GitHub's "Oops" commits since 2020 for leaked secrets and ended up receiving over $25k in bug bounties in rewards.</p><p>They are now open-sourcing a tool that scans a GitHub org to find similar vulnerabilities.</p><p><a href="https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">trufflesecurity.com/blog/guest</span><span class="invisible">-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets</span></a></p><p>(Found on HackerNews)</p><p><a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.online/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.online/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> <a href="https://mastodon.online/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a></p>
Ric<p>The tool I've been using for this has gone offline, and I didn't like the alternatives I was finding, so I've just thrown my own together.</p><p>A free, no-ads, no-nonsense password generator that produces decently strong passwords without misinterpretable characters, and runs in your browser without transferring the results anywhere.</p><p>You're welcome 👍</p><p><a href="https://password-tool.qweb.co.uk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">password-tool.qweb.co.uk</span><span class="invisible"></span></a> </p><p><a href="https://fosstodon.org/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://fosstodon.org/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> <a href="https://fosstodon.org/tags/PasswordGenerator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordGenerator</span></a> , technically <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> </p><p>(and a purposefully ugly favicon just for attention 😆)</p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>It's unfortunate but true that the best way to make something secure is to make it as inconvenient to use as possible; even for legitimate users.</p><p><a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/auth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>auth</span></a></p>
Chema Alonso :verified:<p>El lado del mal - WhiteRabbitNeo un LLM (y un "ChatGPT") para el Red Team <a href="https://www.elladodelmal.com/2025/06/whiterabbitneo-un-llm-y-un-chatgpt-para.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">elladodelmal.com/2025/06/white</span><span class="invisible">rabbitneo-un-llm-y-un-chatgpt-para.html</span></a> <a href="https://ioc.exchange/tags/IA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IA</span></a> <a href="https://ioc.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://ioc.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://ioc.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://ioc.exchange/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> <a href="https://ioc.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://ioc.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://ioc.exchange/tags/InteligenciaArtificial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InteligenciaArtificial</span></a> <a href="https://ioc.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Falco offers real-time runtime security for Linux, designed to detect malicious activity via kernel-level monitoring. It tracks syscalls &amp; integrates with Kubernetes metadata while supporting analysis in SIEM systems. <a href="https://infosec.exchange/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> <a href="https://infosec.exchange/tags/CloudNative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudNative</span></a></p><p>Falco's modular repos streamline its ecosystem. Core ones include `libs` (drivers/libraries), `rules` (predefined threat detection rules), and `plugins` (external integrations). Check out `falcoctl` for CLI management. <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p><p>Why is Falco in C++? Its low-level, high-throughput needs require precise control over memory and performance—traits Go can't fully address. Plus, C++ enables kernel-level integration and cross-language plugin compatibility. <a href="https://infosec.exchange/tags/Programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Programming</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/falcosecurity/falco" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/falcosecurity/falco</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Alex Jimenez<p><a href="https://mas.to/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> adoption in <a href="https://mas.to/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> rises to 86%, but knowledge gaps remain</p><p>Deep Instinct's report shows that while 86% of firms increased AI adoption in SecOps, 38% cannot distinguish between machine learning and deep learning.</p><p><a href="https://www.techmonitor.ai/ai-and-automation/ai-adoption-secops-rises-86-knowledge-gaps-remain/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techmonitor.ai/ai-and-automati</span><span class="invisible">on/ai-adoption-secops-rises-86-knowledge-gaps-remain/</span></a></p><p><a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Lazou<p>Wie entwickeln sich moderne SecOps-Plattformen?</p><p>Ich arbeite aktuell an einem Beitrag zu Cortex XSIAM 3.0 – einer integrierten SecOps-Plattform, die klassische SIEM-, SOAR- und XDR-Funktionalitäten mit KI, Automatisierung und Exposure Management vereint.<br>Die Lösung richtet sich klar an große, komplexe Unternehmensumgebungen.<br>Fokus: Architektur, Use-Cases, Abgrenzung zu traditionellen SIEMs.</p><p><a href="https://kanoa.de/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kanoa.de/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> <a href="https://kanoa.de/tags/XSIAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSIAM</span></a> <a href="https://kanoa.de/tags/SIEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIEM</span></a> <a href="https://kanoa.de/tags/Cortex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cortex</span></a></p>
Anoncheg<p><a href="https://techhub.social/tags/dailyreport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dailyreport</span></a> <a href="https://techhub.social/tags/tokenizers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tokenizers</span></a> <a href="https://techhub.social/tags/huggingface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>huggingface</span></a> <a href="https://techhub.social/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://techhub.social/tags/gentoo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gentoo</span></a><br> <a href="https://techhub.social/tags/ebuild" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ebuild</span></a> <a href="https://techhub.social/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a> <a href="https://techhub.social/tags/cargo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cargo</span></a><br>I compiled the HF 🤗 tokenizers library from sources and<br> enhanced Gentoo ebuild file to allow reproducible<br> installation from sources.<br>I removed optional dependencies and disabled HTTP<br> requirements to enhance security.</p><p>I wrote very simple tests for tokenizers, safetensors,<br> transformers and integration test for them, because<br> tokenizers require HF hub for testing, that I disabled.</p><p>It was a hard but good experience with Cargo package<br> manager of Rust. The main problems was due to strange<br> cfg flags that Gentoo should have set automaticly, for<br> ex. target_os=linux was not set. "cfg" is an<br> abomination that you can't add change this safely.</p><p>I didn't find a working solution to manage "cfg" and, so<br> I just patched the Cargo.toml files of dependencies by<br> commenting out lines.<br>(∠・ω )⌒</p>
Anoncheg<p><a href="https://techhub.social/tags/dailyreport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dailyreport</span></a> <a href="https://techhub.social/tags/tokenizers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tokenizers</span></a> <a href="https://techhub.social/tags/huggingface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>huggingface</span></a> <a href="https://techhub.social/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://techhub.social/tags/gentoo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gentoo</span></a><br> <a href="https://techhub.social/tags/ebuild" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ebuild</span></a> <a href="https://techhub.social/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a> <a href="https://techhub.social/tags/cargo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cargo</span></a><br>I compiled the HF 🤗 tokenizers library from sources and<br> enhanced Gentoo ebuild file to allow reproducible<br> installation from sources.<br>I removed optional dependencies and disabled HTT<br> requirements to enhance security.</p><p>I wrote very simple tests for tokenizers, safetensors,<br> transformers and integration test for them.</p><p>It was a hard but good experience with Cargo package<br> manager of Rust. The main problems was due to strange<br> cfg flags that Gentoo should have set automaticly, for<br> ex. target_os=linux was not set. "cfg" is an<br> abomination that you can't add change this safely.</p><p>I didn't find a working solution to manage "cfg" and, so<br> I just patched the Cargo.toml files of dependencies by<br> commenting out lines.<br>(∠・ω )⌒</p>
Anoncheg<p><a href="https://techhub.social/tags/dailyreport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dailyreport</span></a> <a href="https://techhub.social/tags/tokenizers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tokenizers</span></a> <a href="https://techhub.social/tags/huggingface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>huggingface</span></a> <a href="https://techhub.social/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://techhub.social/tags/gentoo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gentoo</span></a><br> <a href="https://techhub.social/tags/ebuild" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ebuild</span></a> <a href="https://techhub.social/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a> <a href="https://techhub.social/tags/cargo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cargo</span></a><br>I compiled HF tokenizers library from sources and<br> enhanced Gentoo ebuild file that allow reproducable<br> installation from sources.<br>I removed optional dependencies and disabled http<br> requirements to enhance security.</p><p>I wrote very simple tests for tokenizers, safetensors,<br> transformers and integration test for them.</p><p>It was hard but good experience with Cargo package<br> manager of Rust. Main problems was because of strange<br> cfg flags that Gentoo should set automaticly:<br> target_os=linux was not set. "cfg" is an abomination you<br> can't add change this safely.</p><p>I didn't found working solution to manage "cfg" and just<br> patched Cargo.toml files of dependencies. by commenting<br> lines.<br>(∠・ω )⌒</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> yeah, cuz every <a href="https://infosec.space/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> of any <a href="https://infosec.space/tags/ISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISP</span></a> is gonna read that and look into the affected hosts if they were in their netwirk and obviously share the findings with investigators.</p><ul><li>And I don't blame them since <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attacks espechally at that scale do create a lot if cost and anger at their end as well.</li></ul><p>So everyone but the malicious actor is gonna be mad...</p><ul><li>Which makes it <em>an even worse decision!</em></li></ul>
Marco Ciappelli🎙️✨:verified: :donor:<p>Monday news from ITSPmagazine 🙂 <a href="https://infosec.exchange/tags/happymonday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>happymonday</span></a>!</p><p>Join Marc Manzano, Sean Martin, CISSP and me on this week SandboxAQ Webinar! </p><p>After an incredible conversation with Marc on the <a href="https://infosec.exchange/tags/RSAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSAC</span></a> floor in San Francisco — where Sean and I used every second of our time and still had more to explore — I knew the <a href="https://infosec.exchange/tags/Sandbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sandbox</span></a> Story couldn’t stop there.</p><p>If you missed that on-location episode from <a href="https://infosec.exchange/tags/RSAC2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSAC2025</span></a>, catch it here:</p><p>👉 Security at the Edge of Change – A Brand Story with Marc Manzano from SandboxAQ</p><p><a href="https://www.itspmagazine.com/their-stories/security-at-the-edge-of-change-preparing-for-the-cryptographic-and-ai-tipping-point-a-brand-story-with-marc-manzano-from-sandboxaq-an-on-location-rsac-conference-2025-brand-story" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/security-at-the-edge-of-change-preparing-for-the-cryptographic-and-ai-tipping-point-a-brand-story-with-marc-manzano-from-sandboxaq-an-on-location-rsac-conference-2025-brand-story</span></a></p><p>Now, we’re keeping the momentum going with a live ITSPmagazine webinar you don’t want to miss — and I won’t either. 🤘😬 </p><p>🔐 How To Detect And Mitigate Non-Human Identity And Cryptographic Vulnerabilities | An ITSPmagazine Webinar with SandboxAQ</p><p>Join Marc, Sean, and me as we dig deeper into how SandboxAQ is tackling one of today’s most urgent security challenges.</p><p>Unmanaged cryptographic assets and non-human identities have left security teams blind to critical risks. These gaps have fueled vulnerabilities, breaches, compliance challenges, and operational drag across enterprise environments.</p><p>By attending, you’ll:</p><p>🔸 Gain visibility into cryptographic assets and non-human identities like API keys, certificates, and service accounts</p><p>🔸 See how <a href="https://infosec.exchange/tags/AQtiveGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AQtiveGuard</span></a> enables automated discovery, threat detection, and root cause analysis without disrupting workflows</p><p>🔸 Learn how to future-proof your security with Post-Quantum Cryptography readiness and AI-powered <a href="https://infosec.exchange/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a></p><p>📌 Learn more:</p><p>👉 <a href="https://www.itspmagazine.com/itspmagazine-webinar-calendar/how-to-detect-and-mitigate-non-human-identity-and-crytographic-vulnerabilities-an-itspmagazine-webinar-with-sandboxaq" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/itspmagazine-</span><span class="invisible">webinar-calendar/how-to-detect-and-mitigate-non-human-identity-and-crytographic-vulnerabilities-an-itspmagazine-webinar-with-sandboxaq</span></a></p><p>📅 REGISTER NOW:</p><p>Can’t attend the live webinar? All registrants get exclusive access with a link to rewatch the recording.</p><p>👉 <a href="https://www.crowdcast.io/c/how-to-detect-and-mitigate-non-human-identity-and-crytographic-vulnerabilities-an-itspmagazine-webinar-with-sandboxaq" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">crowdcast.io/c/how-to-detect-a</span><span class="invisible">nd-mitigate-non-human-identity-and-crytographic-vulnerabilities-an-itspmagazine-webinar-with-sandboxaq</span></a></p><p>Share the news and join us!</p><p>See you live on Thursday! </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p><p><a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a></p><p><a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p><a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a></p><p><a href="https://infosec.exchange/tags/postquantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postquantum</span></a></p><p><a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p><p><a href="https://infosec.exchange/tags/identitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identitymanagement</span></a></p><p><a href="https://infosec.exchange/tags/webinar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webinar</span></a></p>
Ain Tohvri<p>If you have Cuponomia or any other listed <a href="https://mstdn.social/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> extensions installed, remove them and rotate all your passwords. <a href="https://www.bleepingcomputer.com/news/security/chrome-extensions-with-6-million-installs-have-hidden-tracking-code/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/chrome-extensions-with-6-million-installs-have-hidden-tracking-code/</span></a> <a href="https://mstdn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.social/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Unixorn - 90% Snark by weight<p><span class="h-card" translate="no"><a href="https://mastodon.xyz/@401matthall" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>401matthall</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/sre" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sre</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/infosec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>infosec</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/secops" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>secops</span></a></span> <a href="https://hachyderm.io/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://hachyderm.io/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a></p><p>I'm going to say anything where you had to use physical switches counts. The only real difference is that you don't need to find and straighten out a paper clip so they're marginally less pain in the ass to change the settings</p>
Unixorn - 90% Snark by weight<p>OH on work slack while joking about how ridiculous infosec gatekeeping can be:</p><p>IF YOU’VE NEVER CHANGED YOUR BAUD RATE BY ADJUSTING DIP SWITCHES, I’M NOT INTERESTED IN YOUR CYBERSECURITY OPINIONS</p><p><a href="https://hachyderm.io/tags/greyscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>greyscale</span></a> <a href="https://hachyderm.io/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://hachyderm.io/tags/sre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sre</span></a> <a href="https://hachyderm.io/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/sre" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sre</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/infosec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>infosec</span></a></span> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/secops" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>secops</span></a></span></p>
DevConf<p>🐱 Modular monoliths require boundaries, consistent care, and security planning—just like cats! Join William Brander at <a href="https://mastodon.cloud/tags/DevConf2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevConf2025</span></a> to discover how this surprising analogy can transform your approach to software architecture and security. <a href="https://mastodon.cloud/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.cloud/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a></p>
AndiMann<p>"The Graphic Future Of <a href="https://masto.ai/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> Management"</p><p>Fascinating thesis on convergence of *Ops (incl. <a href="https://masto.ai/tags/ITSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSM</span></a>, <a href="https://masto.ai/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a>, <a href="https://masto.ai/tags/FinOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinOps</span></a>, <a href="https://masto.ai/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a>, <a href="https://masto.ai/tags/AIOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIOps</span></a> + <a href="https://masto.ai/tags/SRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SRE</span></a>, <a href="https://masto.ai/tags/APM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APM</span></a>, <a href="https://masto.ai/tags/ITIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITIM</span></a>, <a href="https://masto.ai/tags/ITOM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITOM</span></a> etc.) into a new <a href="https://masto.ai/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> driven visual <a href="https://masto.ai/tags/ITOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITOps</span></a> paradigm. Big if true!</p><p>The awesome @charlestbetz.bsky.social via <a href="https://masto.ai/tags/Forrester" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forrester</span></a></p><p><a href="https://www.forrester.com/blogs/the-graphic-future-of-it-management/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forrester.com/blogs/the-graphi</span><span class="invisible">c-future-of-it-management/</span></a></p>
mephisto<p>Want basic SentinelOne Data in your Grafanadashboard?</p><p>telegraf.conf.d/s1.conf:</p><p>[[inputs.http]]<br> urls = ["<a href="https://yourniceinstance.sentinelone.net/web/api/v2.1/threats?tenant=true&amp;resolved=false" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yourniceinstance.sentinelone.n</span><span class="invisible">et/web/api/v2.1/threats?tenant=true&amp;resolved=false</span></a>"]<br> method = "GET"<br> json_query = "{data.@valid.#}.@pretty"<br> tagexclude = ["url", "host"]<br> name_override = "s1_unresolved_threat_count"<br> ## Optional HTTP headers<br> headers = {"Authorization" = "Bearer YourNiceApiToken"}<br> data_format = "json"</p><p><a href="https://social.netz.org/tags/secops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secops</span></a> <a href="https://social.netz.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.netz.org/tags/sentinelone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sentinelone</span></a> <a href="https://social.netz.org/tags/xdr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xdr</span></a></p>
StreamRadar<p>📺 Join the stream! We're live on Owncast: <a href="https://live.monospacementor.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">live.monospacementor.com</span><span class="invisible"></span></a> 📺<br>Stream by: None<br><a href="https://mastodon.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a> <a href="https://mastodon.social/tags/SecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecOps</span></a> <a href="https://mastodon.social/tags/SRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SRE</span></a> <a href="https://mastodon.social/tags/InstructorLiveStream" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InstructorLiveStream</span></a> <a href="https://mastodon.social/tags/TechTalks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechTalks</span></a> <a href="https://mastodon.social/tags/owncast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>owncast</span></a> <a href="https://mastodon.social/tags/livestream" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>livestream</span></a> <a href="https://mastodon.social/tags/stream" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stream</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a></p>