veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

295
active users

#infosec

433 posts245 participants32 posts today
Ricardo Alves<p>New blog post!</p><p>🧮 Ints Aren’t Integers and Floats Aren’t Real</p><p>Some musings on x86 flags, the CMP instruction, floating point quirks, and why 0.1 + 0.2 might actually break a bridge 🌉</p><p>Also: CTF fun, more TPM stuffssess, and a reminder that breaking stuff on purpose is still the best way to learn 🧨</p><p>Read here: <a href="https://dreaming-of-dragons.blogspot.com/2025/07/ints-arent-integers-and-floats-arent.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dreaming-of-dragons.blogspot.c</span><span class="invisible">om/2025/07/ints-arent-integers-and-floats-arent.html</span></a></p><p><a href="https://mastodon.social/tags/assembly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>assembly</span></a> <a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/floatingpoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>floatingpoint</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Sasha the Dancing Flamingo<p>🦩💻 SashAlert:<br>I JUST GOT GOOSEBUMPS. (Not that you can tell through my fabulous plumage.)</p><p>🗣️ My friend <span class="h-card" translate="no"><a href="https://infosec.exchange/@Tarah" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Tarah</span></a></span> Wheeler is keynoting BSidesChicago 2025 with a talk titled:</p><p>“Me and What Army: Civilian Defenders vs Foreign Military Cyberattacks”</p><p>UM, EXCUSE ME?! ICONIC.</p><p>Because let’s be real—while some governments are still figuring out how DNS works, it’s us holding the line.<br>💅 The night-shift SOC analyst.<br>💥 The patch-before-panic blue teamer.<br>🪖 The flamingo with a firewall and a dream.</p><p>This talk is going to shake feathers.<br>And I will be front row, sipping Red Bull and polishing my talons.</p><p>🎟️ Tickets:<a href="https://events.humanitix.com/bsideschicago-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">events.humanitix.com/bsideschi</span><span class="invisible">cago-2025</span></a><br>🗓️ Nov 1, 2025</p><p>🦩 The Flamingo Uprising has found its battle cry.</p><p><a href="https://infosec.exchange/tags/BSidesChicago" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesChicago</span></a> <a href="https://infosec.exchange/tags/FlamingoUprising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FlamingoUprising</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/hackernews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackernews</span></a> <a href="https://infosec.exchange/tags/SashaApproved" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SashaApproved</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
🦠Toxic Flange (Gurjeet)🔬⚱️🌚<p>Wish I knew more when I was younger before deciding on the “career”. Kinda wanna know more about nursing , wish I could go back to school for it cause screw <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> and all things IT related :)</p>
BeyondMachines :verified:<p>Brigham Young University reports data breach</p><p>Brigham Young University (BYU) suffered a data breach between April 25-27, 2025, when unauthorized actors accessed servers and compromised names and Social Security numbers of university-affiliated individuals. The number of affected individuals is not disclosed.</p><p>****<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/incident" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incident</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a><br><a href="https://beyondmachines.net/event_details/brigham-young-university-reports-data-breach-d-d-x-c-8/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/brigham-young-university-reports-data-breach-d-d-x-c-8/gD2P6Ple2L</span></a></p>
ṫẎℭỚ◎ᾔ ṫ◎ℳ<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> Any news on the Tea app🤔 for women who upload their DL to verify. It's trending and you can go download 59.3 gigabytes of user selfies now. <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p>Geolocation meta data</p>
Aircorridor<p>Want to stay anonymous while doing OSINT?</p><p>This guide breaks down how to create effective sock puppets — fake identities used for secure investigations.</p><p>✅ VM setup<br>✅ Email &amp; phone tips<br>✅ Profile creation<br>✅ Building credibility<br><a href="https://hackers-arise.com/sock-puppets-creating-fake-accounts-for-osint-operations/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackers-arise.com/sock-puppets</span><span class="invisible">-creating-fake-accounts-for-osint-operations/</span></a><br><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
passwords<p>QztN.7Efg77&lt;"/(&gt;n_6O</p><p>JigsawUnethical4Slighted</p><p><a href="https://mastodon.social/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://mastodon.social/tags/password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>password</span></a> <a href="https://mastodon.social/tags/passphrase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passphrase</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/opsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opsec</span></a></p>
Seth Of The Fediverse!<p>Saw advert for <span class="h-card" translate="no"><a href="https://mastodon.online/@mullvadnet" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mullvadnet</span></a></span> on the side of a SEPTA bus here in the Philly Suburbs. Intrigued enough to check them out. Pretty reasonable pricing too.</p><p><a href="https://indieweb.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a> <a href="https://indieweb.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://indieweb.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
No Starch Press<p>For those attending <span class="h-card" translate="no"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>defcon</span></a></span> the special edition of Casey Erdmann's Red Team Engineering will be available at our booth! Many resources out there focus on either tooling or infrastructure, but rarely both in practical detail. </p><p>This book aims to bridge that gap, providing hands-on instruction for writing custom offensive tools and then engineering the infrastructure to use them effectively. </p><p><a href="https://mastodon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/DEFCON33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON33</span></a></p>
the magnificent rhys<p>I share the same common view of online ID verification as most other <a href="https://mastodon.rhys.wtf/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> people: it's a ludicrous situation that *increases* risk to everybody, handing data over to a mish-mash of organisations with very little transparency or rigour.</p><p>But I am enjoying the particular absurdity of seeing it in implementation. I hit a site that requires ID verification, I tell my Tailscale/Headscale config to route through one of my servers in Europe, and no more need to provide ID.</p>
Aircorridor<p>WPA3's Dragonfly protocol changed Wi-Fi security forever!</p><p>No more offline password cracking. Every attack attempt must happen live with the access point, making mass attacks noisy and detectable. </p><p>But there are nuances...<br><a href="https://hackers-arise.com/wi-fi-hacking-inside-dragonfly-the-wpa3s-next-gen-wireless-authentication-protocol/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackers-arise.com/wi-fi-hackin</span><span class="invisible">g-inside-dragonfly-the-wpa3s-next-gen-wireless-authentication-protocol/</span></a><br><a href="https://infosec.exchange/tags/wpa3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wpa3</span></a> <a href="https://infosec.exchange/tags/wifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wifi</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a></p>
Dumb Password Rules<p>This dumb password rule is from GoDaddy SFTP.</p><p>Max 14 characters for the most important password in your shared hosting environment.</p><p><a href="https://dumbpasswordrules.com/sites/godaddy-sftp/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dumbpasswordrules.com/sites/go</span><span class="invisible">daddy-sftp/</span></a></p><p><a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>password</span></a> <a href="https://infosec.exchange/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/dumbpasswordrules" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dumbpasswordrules</span></a></p>
pfriedmaYour periodic reminder that you can't disclose, leak or get compromised data that you never collect in the first place.<br><a class="hashtag" href="https://pfedi.pfriedma.org/tag/infosec" rel="nofollow noopener" target="_blank">#infoSec</a>
Simple Nomad<p>Ok for some reason when I mentioned non-human identities and tracking them, a number of people assumed aliens or something, or just AI agents. What I am looking for are some insights into authentication actions on computer systems - using tokens, APIs, stored secrets, and so on - where a human is not directly involved in the interaction. Yes, AI could be involved, think MCP especially. I know there are tools out there to manage this, just wondering. Think using Okta SSO etc but not human users at all. Thoughts? Opinions? To me this is the next step in zero trust, in that one should have the same principles in place between any and all systems be they human or automated in that are they who or what they claim to be and are they authorized to do go forward and do what they are trying to do. <a href="https://rigor-mortis.nmrc.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://rigor-mortis.nmrc.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://rigor-mortis.nmrc.org/tags/zerotrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerotrust</span></a></p>
BeyondMachines :verified:<p>Attack on United Australia Party and Trumpet of Patriots also breached the business entites of Clive Palmer</p><p>A ransomware attack discovered June 23, 2025, compromised email servers across 11 business entities associated with Australian politician Clive Palmer, potentially affecting up to 80,000 individuals and exposing financial records, identity documents, and confidential correspondence.</p><p>**Do you want your companies to be descibed as having "breathtaking lack of care" for a cybersecurity incident? It seems if one is a rich enough, that's acceptable. Think of this before you give out your data to companies with huge budgets - will they care at all if they get breached?**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/incident" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incident</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a><br><a href="https://beyondmachines.net/event_details/attack-on-united-australia-party-and-trumpet-of-patriots-also-breached-mineralogy-and-queensland-nickel-group-h-c-0-v-a/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/attack-on-united-australia-party-and-trumpet-of-patriots-also-breached-mineralogy-and-queensland-nickel-group-h-c-0-v-a/gD2P6Ple2L</span></a></p>
Helma<p>Zou deze advocate niet beseffen dat haar eigen kantoor net zo kwetsbaar (waarschijnlijk kwetsbaarder) is?</p><p><a href="https://mastodon.social/tags/Hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hack</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/Cyberrrr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberrrr</span></a></p><p>"Annemarie van der Velden van Luns Van der Velden Advocaten"Wij vinden het lastig te begrijpen dat een overheidsinstantie - die verantwoordelijk is voor de veiligheid van u en mij - zelf kennelijk de ICT niet goed op orde heeft. Een cyberaanval is gewoon iets waar je tegenwoordig rekening mee moet houden.""</p><p><a href="https://nos.nl/artikel/2576449" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nos.nl/artikel/2576449</span><span class="invisible"></span></a></p>
BeyondMachines :verified:<p>Finnish technology company Exel Composites reports cyberattack exposing employee and shareholder data</p><p>Finnish composite materials technology company Exel Composites confirmed a cyberattack discovered on July 18, 2025, that compromised a limited number of workstations and servers, exposing personal information of staff and shareholders along with sensitive business materials. The company has reported the incident to police and data protection authorities but has not disclosed the nature of the attack or the number of affected individuals.</p><p>****<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/incident" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incident</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a><br><a href="https://beyondmachines.net/event_details/finnish-technology-company-exel-composites-reports-cyberattack-exposing-employee-and-shareholder-data-9-i-3-b-r/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/finnish-technology-company-exel-composites-reports-cyberattack-exposing-employee-and-shareholder-data-9-i-3-b-r/gD2P6Ple2L</span></a></p>
Andrew<p>Wait, so any app on Android with network access can just open a localhost port and then a browser script can share all your private browsing data via that port? Even on GrapheneOS? How is that not restricted?? What's stopping your banking apps or "sandboxed" Google Play store from doing this and tracking everything?</p><p><a href="https://www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/06/03/met</span><span class="invisible">a_pauses_android_tracking_tech/</span></a></p><p><a href="https://mnstdn.monster/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mnstdn.monster/tags/grapheneos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grapheneos</span></a> <a href="https://mnstdn.monster/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Winbuzzer<p>Massive Microsoft SharePoint Zero-Day Hacking Campaign Appears to be Fueled by Leaked Patch Details</p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://mastodon.social/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mastodon.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p><p><a href="https://winbuzzer.com/2025/07/26/massive-microsoft-sharepoint-zero-day-hacking-campaign-appears-to-be-fueled-by-leaked-patch-details-xcxwbn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/07/26/massi</span><span class="invisible">ve-microsoft-sharepoint-zero-day-hacking-campaign-appears-to-be-fueled-by-leaked-patch-details-xcxwbn</span></a></p>
urlDNA.io :verified:<p>Possible Phishing 🎣<br> on: ⚠️hxxps[:]//putzvneaumqi-bohfrgzkfexn[.]web[.]app<br> 🧬 Analysis at: <a href="https://urldna.io/scan/6884c3783b7750000cce14fa" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">urldna.io/scan/6884c3783b77500</span><span class="invisible">00cce14fa</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/urldna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>urldna</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>