veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

275
active users

#itsec

3 posts3 participants0 posts today

»Your password manager is under attack, and this new threat makes it worse: How to defend yourself:
Heard of polymorphic browser extensions yet? You will. These savage imposters threaten the very future of credential management. Here's what you need to know - and do.«

I use @keepassxc, but with the plugins for the browsers you should make sure that you use the right ones.

🔐 zdnet.com/article/your-passwor

ZDNET · Your password manager is under attack, and this new threat makes it worse: How to defend yourselfBy David Berlind
Replied in thread

@dave_andersen @AVincentInSpace personally I consider any "#KYC" a risk-factor, and @signalapp has proven their ability and willingness to restrict functionality (i.e. their #Shitcoin-#Scam #MobileCoin) based off said #PhoneNumbers (Cuban, Russian and North Korean Numbers were excluded) which are in fact #PII (even if one doesn't have to #ID for obtaining a #SIM, they are circumstantial PII)...

  • They have neither "legitimate interest" nor legal mandate to collect said data (or to integrate a scammy Shitcoin for that matter) as the discontinuation of #ChatSecure / #TextSecure has eliminated the "technical necessity" to have those.

Either way they either have to yeet #Hegseth as client and/or stop collecting PII like PhoneNumbers - they gotta have to do something

#ITsec is a different story, but unlike #Signal these do not depend on a #PhoneNumber and work through @torproject / #Tor.

  • And I've been using Tor for almost 15 years daily now...

Who needs #phishing when your login's already in the wild?
Stolen #credentials edge out email tricks for cloud break-ins because they're so easy to get
Criminals used stolen credentials more frequently than email phishing to gain access into their victims' IT systems last year, marking the first time that compromised login details claimed the number two spot in Mandiant's list of most common initial infection vectors.
theregister.com/2025/04/23/sto
#itsec #security

The Register · Who needs phishing when your login's already in the wild?By Jessica Lyons

I took an ITSec training today that gave "Thi5izmyP4ssWord!" as an example of a good password to use. I'm curious what people think of a password like this.
#ITSec #security #passwords

ARD AudiothekPodcast: Das wichtigste Hobby der WeltChristian kämpft mit Selbstzweifeln. Doch dann findet er ein neues Hobby, das sein Leben ändert - und nebenbei das von jedem, der das hier gerade liest. Ein Deep Dive in die Welt der Open Source Maintainer, eine Gruppe freiwilliger Programmierer, die das Internet für uns alle am Laufen hält und dabei immer mehr Druck gerät. SHOWNOTES Podcast-Tipp: "Too Many Tabs" hört ihr hier: https://1.ard.de/too_many_tabs Happy Places der Woche: André nerdet sich in Beatles Songs rein: https://shorturl.at/D4Arp Caro von Too Many Tabs ist im "Wer wird Millionär Trainingslager" unterwegs: https://spiele.rtl.de/denk-spiele/wer-wird-millionaer-trainingslager-online.html Und Miguel treibt sich auf den Insta-Accounts von Hubert Feller und Matthias Mangiapane rum: https://www.instagram.com/reel/DHRRNHZoJNE/ Hier lest ihr einen guten Text des Standard zum finnischen Entwickler Lasse Collins und dem XZ Utils "Hack": https://www.derstandard.at/story/3000000213960/wie-die-computerwelt-gerade-haarscharf-an-einer-sicherheitskatastrophe-vorbeigeschrammt-ist Vordenker Richard Stallman über die Grundsätze der Open Source Bewegung https://www.youtube.com/watch?v=Ag1AKIl_2GM Schüler eklären Log4j so gut, dass es jeder versteht https://www.youtube.com/watch?v=W_p6YmLQfp8 CNN Beitrag über Log4J https://edition.cnn.com/2021/12/15/tech/log4j-vulnerability/index.html Das Open Source Förderprogramm des Bundesministeriums für Wirtschaft und Klimaschutz https://www.sovereign.tech/ Ein Ex-Maintainer bloggt über seine Gründe aus Open Source auszusteigen https://dev.to/sapegin/why-i-quit-open-source-1n2e

Browser extensions... seriously? 🤯 Think of 'em like little backdoors straight into your systems.

Sure, things like spellcheckers and handy AI tools seem convenient, right? But the permissions they often demand? Honestly, it's often insane. 😵‍💫

Look, as a pentester, I strike gold with these *all the time*! 💰 We're talking cookies, passwords, browsing habits – sometimes it's all just wide open. And *then* people are shocked when they get hacked. 🤷‍♂️

Yeah, security awareness training definitely matters. But here’s what’s even more critical: you absolutely *need* to know which extensions your team is actually using! Go on, check those permissions thoroughly! Otherwise, you're just asking for trouble down the line. 💥

So, spill the beans: Which browser extension has given *you* a major headache before? Let's hear it!