Trending

#Infosec

Latest posts tagged with #Infosec on Bluesky

Posts tagged #Infosec

Post image

Not all cyber threats are technical.
Impersonation + trust-building + coercion - a real case shows how social engineering can escalate fast.
Are platforms equipped to stop this early?
Follow TechNadu for more insights.
#CyberSecurity #OnlineSafety #InfoSec

0 0 1 0
Post image

Podcast: Wildlife Cops Are Searching AI Cameras for ICE #cybersecurity #hacking #news #infosec #security #technology #privacy www.404media.co/podc...

0 0 0 0
Bypassing Zammad's AI text tool authorization via REST API (CVE-2026-34782 / CVE-2026-34837) How missing authorization checks in Zammad's REST API let agents execute group-restricted AI text tools and inject unauthorized ticket context into AI prompts.

New blog post: I found two authorization bypasses in Zammad's new AI text tools feature, two weeks after 7.0 shipped. Any agent could execute group-restricted tools and pull ticket data from other groups via a single API call.

moltenbit.net/posts/bypass...

#infosec #zammad #cybersecurity

0 0 0 0
Original post on infosec.exchange

Hello AppSec community!

Our preparations for German #OWASP Day 2026 (GOD) are in full swing. As some of you may have noticed, the website is already live (and kicking): https://god.owasp.de/

This year’s GOD will take place on September 24, 2026, in Karlsruhe. It's a one-day conference with two […]

1 1 0 0
From Kernel to Cloud: Open Source Takes On Security Trade-Offs Open-source systems are adopting live patching and isolation technologies to support always-on security and meet enterprise compliance demands in the cloud. The post From Kernel to Cloud: Open…

[Linux Insider] From Kernel to Cloud: Open Source Takes On Security Trade-Offs

#LinuxKernel #OpenSource #InfoSec

0 0 0 0
Original post on mastodon.social

A hacker claims to have exfiltrated over 10 petabytes of sensitive military and research data from Tianjin’s National Supercomputing Centre

www.computing.co.uk/news/2026/china-supercom...

#china […]

0 2 0 0
Post image

A 'Self-Doxing' Rave Helps Trans People Stay Safe Online #cybersecurity #hacking #news #infosec #security #technology #privacy www.404media.co/tran...

0 0 0 0
Post image

Maine Is Close to Passing a Moratorium on New Datacenters #cybersecurity #hacking #news #infosec #security #technology #privacy www.404media.co/main...

0 0 0 0

So fun fact, I've discovered that the Dell EMC 1U faceplate is actually well suited to reach the areas of my back that I can't scratch. I now have one permanently stationed at my side desk.

#it #technology #servers #infotech #infosci #secops #infosec #hosting

0 1 1 0
Post image

ASN: AS4134 CHINANET-BACKBONE
Country: CN
City: Changsha
State: Hunan
Scanned: 2025-05-07T15:21:00
https://computernewb.com/vncresolver/browse#id/23414834

#vnc #infosec

0 0 0 0
Is a Security Baseline Enough for Open-Source Software? The OpenSSF’s new baseline sets minimum security expectations for open-source projects — but not all developers agree it’s practical, scalable, or sufficient. The post Is a Security Baseline Enough…

[Linux Insider] Is a Security Baseline Enough for Open-Source Software?

#InfoSec #OpenSource

0 0 0 0
Post image

ASN: AS231
Location: East Lansing, US
Added: 2026-04-03T19:37

#shodansafari #infosec

0 0 0 0

8/ That's your Wednesday briefing. Patch Docker, laugh at Copilot's terms, and keep questioning everything. 🙏 #TechNews #Cybersecurity #AI #Docker #InfoSec

0 0 0 0
Preview
Russian hacking group targets home and small office routers to spy on users The FBI, NCSC, and Microsoft warn of an ongoing Russian campaign hijacking DNS settings on home and small office routers to spy on users.

Russian hacking group targets home and small office routers to spy on users #cybersecurity #hacking #news #infosec #security #technology #privacy

0 0 0 0
Is a Security Baseline Enough for Open-Source Software? The OpenSSF’s new baseline sets minimum security expectations for open-source projects — but not all developers agree it’s practical, scalable, or sufficient. The post Is a Security Baseline Enough…

[Linux Insider] Is a Security Baseline Enough for Open-Source Software?

#InfoSec #OpenSource

0 0 0 0
SaaS Notification Pipeline Abuse, GitHub Phishing Campaigns, and Jira Notification Hijacking Increased, Cisco Talos Warns SaaS notification pipeline abuse, GitHub phishing campaigns, and Jira notification hijacking dangerously escalate enterprise cybersecurity risks.

Full Article: www.technadu.com/saas-notific...

💬 Do you think zero-trust is now essential for SaaS communications? Drop your thoughts below!
#Cybersecurity #Phishing #SaaS #GitHub #Jira #Infosec #ThreatDetection #ZeroTrust

0 0 0 0
Post image

Phishing is evolving 🚨
Attackers now abuse GitHub & Jira notifications to bypass email security controls.
Trusted platforms = new attack surface.

What’s your take?
#Cybersecurity #Infosec #Phishing

0 0 1 0
Post image

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...

2 1 0 0
From Kernel to Cloud: Open Source Takes On Security Trade-Offs Open-source systems are adopting live patching and isolation technologies to support always-on security and meet enterprise compliance demands in the cloud. The post From Kernel to Cloud: Open…

[Linux Insider] From Kernel to Cloud: Open Source Takes On Security Trade-Offs

#LinuxKernel #OpenSource #InfoSec

0 0 0 0
Post image

ASN: AS24940 Hetzner Online GmbH
Country: FI
City: Helsinki
State: Uusimaa
Scanned: 2025-05-07T19:05:40
https://computernewb.com/vncresolver/browse#id/85476027

#vnc #infosec

0 0 0 1
Post image

ASN: AS4685
Location: Osaka, JP
Added: 2026-04-03T21:32

#shodansafari #infosec

0 0 0 0
Post image

We’ve been working on something special…

🌟 Our first Impact Report is here!
Real stories, real voices, real impact, all made possible by you.

📄 owasp.org/assets/fil...

We are very proud of this one. Excited for what’s next 💪❤️

#OWASP #Impactreport #community #opensource #infosec #appsec

3 0 0 0
Preview
Cybersecurity for Startups: Your Guide to Staying Protected Master cybersecurity for startups with our timeline-based guide. Learn how early security audits protect your valuation & ensure compliance to scale safely.

🧠Hackers don’t care if you’re early-stage

They scan
They find
They exploit

Startups with weak basics are the easiest targets.

👉Fix it early, not after a breach: 7asecurity.com/blog/2026/04...


#CyberSecurity #Startups #AppSec #InfoSec

0 0 0 0
Illustration of three people raising a flagpole with a magenta flag, with the text "DNSSEC" above and quad9 logo below on a gray background.

Illustration of three people raising a flagpole with a magenta flag, with the text "DNSSEC" above and quad9 logo below on a gray background.

Mark your calendar!

Starting June 15, 2026, DNSSEC strict validation will be active across every Quad9 service endpoint, including 9.9.9.10. 🥳

#DNSSEC #DNS #infosec

quad9.net/news/blog/qu...

4 0 0 0
Is a Security Baseline Enough for Open-Source Software? The OpenSSF’s new baseline sets minimum security expectations for open-source projects — but not all developers agree it’s practical, scalable, or sufficient. The post Is a Security Baseline Enough…

[Linux Insider] Is a Security Baseline Enough for Open-Source Software?

#InfoSec #OpenSource

0 0 0 0
Video

Complete VAPT Process Explained

Think your system is secure? Think again.

VAPT reveals hidden vulnerabilities before attackers do. From recon to reporting see how ethical hackers secure web, API, network & cloud systems.

📩 www.vaptsecurity.com

#VAPT #CyberSecurity #EthicalHacking #InfoSec

0 0 0 0
Preview
Microsoft open-source toolkit secures AI agents at runtime A new open-source toolkit from Microsoft focuses on runtime security to force strict governance onto enterprise AI agents.

Microsoft has released a new open-source runtime security toolkit designed to force strict governance over enterprise AI agents. #microsoft #agenticai #opensource #ai #infosec #enterpriseai #technology

2 0 1 0
Post image

Locking down a #Linux system comes down to shrinking the attack surface, tightening access, and cutting off anything unnecessary—here are the commands that help you do it 😎👇

Find pdf ebooks with all my #cybersecurity related infographics at study-notes.org/cybersecurit...

#infosec

1 0 1 1
Is a Security Baseline Enough for Open-Source Software? The OpenSSF’s new baseline sets minimum security expectations for open-source projects — but not all developers agree it’s practical, scalable, or sufficient. The post Is a Security Baseline Enough…

[Linux Insider] Is a Security Baseline Enough for Open-Source Software?

#InfoSec #OpenSource

0 0 0 0
Preview
Why Your Automated Pentesting Tool Just Hit a Wall Automated pentesting tools deliver strong early results, then quickly plateau. Picus Security explains how the "PoC cliff" leaves major attack surfaces untested and creates a dangerous validation gap.

Why Your Automated Pentesting Tool Just Hit a Wall #cybersecurity #hacking #news #infosec #security #technology #privacy

0 0 0 0