dobbs.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
Church of the SubGenius Members-Only MastoDobbs.

Server stats:

139
active users

#cybersecurity

316 posts174 participants22 posts today
Eva Wolfangel<p>Wer von euch ist denn auf der SecIT in <a href="https://chaos.social/tags/Hannover" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hannover</span></a>? Ich halte morgen eine kurze Keynote (mit anschließendem Panel) mit dem Titel "KI - Schutzschild oder Einfallstor?" Iich tendiere zu letzterem und erwarte euren Widerspruch. Oder euren Zuspruch. :)<br>Freue mich über Gespräche zum Kaffee und so. Stupst ihr mich an, falls ihr vor Ort seid?<br><a href="https://secit-heise.de/programm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">secit-heise.de/programm</span><span class="invisible"></span></a><br><a href="https://chaos.social/tags/secIT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secIT</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://chaos.social/tags/ITSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSec</span></a></p>
Loki the Cat<p>Looks like Google found its Wizard of Oz! 🧙‍♂️ Alphabet's dropping $32B on cybersecurity firm Wiz - their biggest acquisition ever. Funny how Big Tech's shopping list went from "cool gadgets" to "please don't hack us" these days. At this rate, Silicon Valley's becoming Cybersecurity Valley! <a href="https://jorijn.dev/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://jorijn.dev/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> </p><p><a href="https://tech.slashdot.org/story/25/03/18/1117215/google-parent-alphabet-agrees-to-buy-cyber-security-group-wiz-for-32-billion" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tech.slashdot.org/story/25/03/</span><span class="invisible">18/1117215/google-parent-alphabet-agrees-to-buy-cyber-security-group-wiz-for-32-billion</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>Round 2.0.</p><p>Google's parent company, Alphabet, is in advanced talks to acquire cloud cybersecurity startup <span class="h-card" translate="no"><a href="https://infosec.exchange/@wiz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wiz</span></a></span> for around $30 billion.</p><p>This follows a previous attempt last summer to secure a deal at a $23 billion valuation, which fell through. Wiz's strong annual recurring revenue and cloud security products are seen as a good fit for Google Cloud.</p><p><a href="https://techcrunch.com/2025/03/17/google-revives-talks-to-acquire-wiz-at-higher-valuation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/03/17/goog</span><span class="invisible">le-revives-talks-to-acquire-wiz-at-higher-valuation/</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Conan the Sysadmin<p>Many are the tricksters preying upon the innocent and the naive. May Set feast upon their souls, may Khepri roll them into little balls and push them into the river! <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://cromwell-intl.com/cybersecurity/scams-spam-phishing.html?s=mc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/scams-spam-phishing.html?s=mc</span></a></p>
Christoffer S.<p>Sekoia: <a href="https://blog.sekoia.io/clearfakes-new-widespread-variant-increased-web3-exploitation-for-malware-delivery/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sekoia.io/clearfakes-new-</span><span class="invisible">widespread-variant-increased-web3-exploitation-for-malware-delivery/</span></a></p><p>A few days ago Brian Krebs wrote about ClickFix, and now Sekoia has written a technical deep dive of said malicious framework.</p><p>In the Sekoia report they analyze the evolution of ClearFake, a malicious JavaScript framework that compromises legitimate websites to deliver malware through drive-by downloads. Since its emergence in July 2023, ClearFake has evolved from displaying fake browser updates to using sophisticated social engineering tactics called 'ClickFix' that trick users into executing malicious PowerShell code. The latest variant (December 2024-February 2025) uses fake reCAPTCHA or Cloudflare Turnstile verifications alongside technical issues to deceive users. ClearFake leverages the Binance Smart Chain through a technique called 'EtherHiding' to store malicious code, making it impossible to remove. The framework has infected thousands of websites and is actively distributing Lumma Stealer and Vidar Stealer malware.</p><p><a href="https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three-easy-steps/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/03/cl</span><span class="invisible">ickfix-how-to-infect-your-pc-in-three-easy-steps/</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>briankrebs</span></a></span> <br><span class="h-card" translate="no"><a href="https://infosec.exchange/@sekoia_io" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sekoia_io</span></a></span> </p><p><a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://swecyb.com/tags/ClickFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClickFix</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p>
heise online English<p>"Additional point of attack": White House directly connected to Starlink</p><p>The seat of the US President is now directly connected to Starlink thanks to a "gift". A cyber security expert speaks of an unnecessary risk.</p><p><a href="https://www.heise.de/en/news/Additional-point-of-attack-White-House-directly-connected-to-Starlink-10319127.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Additional-po</span><span class="invisible">int-of-attack-White-House-directly-connected-to-Starlink-10319127.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/DonaldTrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DonaldTrump</span></a> <a href="https://social.heise.de/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://social.heise.de/tags/SpaceX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpaceX</span></a> <a href="https://social.heise.de/tags/Starlink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Starlink</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online<p>"Zusätzlicher Angriffspunkt": Weißes Haus direkt an Starlink angeschlossen</p><p>Der Sitz des US-Präsidenten ist dank eines "Geschenks" jetzt direkt an Starlink angeschlossen. Ein Cybersicherheitsexperte spricht von einem unnötigen Risiko.</p><p><a href="https://www.heise.de/news/Zusaetzlicher-Angriffspunkt-Weisses-Haus-direkt-an-Starlink-angeschlossen-10319041.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zusaetzlicher-An</span><span class="invisible">griffspunkt-Weisses-Haus-direkt-an-Starlink-angeschlossen-10319041.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/DonaldTrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DonaldTrump</span></a> <a href="https://social.heise.de/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://social.heise.de/tags/SpaceX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpaceX</span></a> <a href="https://social.heise.de/tags/Starlink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Starlink</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Conan the Sysadmin<p>If one cannot pen a message with clear meaning, without resorting to rare inks and fancy illuminations, perhaps one should not write. <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://cromwell-intl.com/cybersecurity/html-email.html?s=mc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/html-email.html?s=mc</span></a></p>
flagthis<p>Critical ESP32 vulnerabilities enable remote code execution via Bluetooth; update advised. <a href="https://ioc.exchange/tags/ESP32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESP32</span></a> <a href="https://ioc.exchange/tags/IoTsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoTsecurity</span></a> <a href="https://ioc.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <br> <br>More details: <a href="https://borncity.com/win/2025/03/16/tarlogic-security-detects-unknown-commands-in-esp32-chip-bluetooth-wifi/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">borncity.com/win/2025/03/16/ta</span><span class="invisible">rlogic-security-detects-unknown-commands-in-esp32-chip-bluetooth-wifi/</span></a> - <a href="https://www.flagthis.com/news/11336" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">flagthis.com/news/11336</span><span class="invisible"></span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>Webinars Are Old News. Here is Something New: <a href="https://infosec.exchange/tags/Webinars" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webinars</span></a>!</p><p>Introducing <span class="h-card" translate="no"><a href="https://techhub.social/@ITSPmagazine" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ITSPmagazine</span></a></span> Webinars: Join the Conversation and Learn from the Experts</p><p>ITSPmagazine Webinars — The Future of Thought Leadership is Here</p><p><a href="https://www.linkedin.com/pulse/webinars-old-news-here-something-new-itspmagazine-z08qe" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/pulse/webinars-ol</span><span class="invisible">d-news-here-something-new-itspmagazine-z08qe</span></a></p><p><a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/society" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>society</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@seanmartin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>seanmartin</span></a></span></p>
Conan the Sysadmin<p>A land between Afghulistan and Vendhya, long known for harboring terrorists, also launches <a href="https://mstdn.social/tags/cyberwar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberwar</span></a> attacks. <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://cromwell-intl.com/cybersecurity/cyberwar/pakistan.html?s=mc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/cyberwar/pakistan.html?s=mc</span></a></p>
Conan the Sysadmin<p>A secret tongue is crucial for <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a>, but one must choose it well and use it cautiously. <a href="https://cromwell-intl.com/cybersecurity/cipher-selection.html?s=mc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/cipher-selection.html?s=mc</span></a></p>
Nonilex<p>…It was…unclear if <a href="https://masto.ai/tags/Starlink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Starlink</span></a> communications were <a href="https://masto.ai/tags/encrypted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encrypted</span></a>. At a minimum, the system allows for a network separate from existing WH servers that people on the grounds are able to use, keeping that data separate.</p><p>“It’s super rare” to install Starlink or another <a href="https://masto.ai/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> provider as a replacement for existing govt <a href="https://masto.ai/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> that has been vetted &amp; secured, said Jake Williams, a VP for R&amp;D at Hunter Strategy, a <a href="https://masto.ai/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> consultancy. “I can’t think of a time that I have heard of that.”</p>
Kevin Thomas ✅<p>Israeli-Russian citizen Rostislav Panev, a developer for the LockBit ransomware group, has been extradited to the U.S. to face charges related to global cyberattacks that caused $500 million in damages across 2,500 victims in 120+ countries. Investigators linked Panev to LockBit via credentials found on his device granting access to repositories storing the malware, and he allegedly received $230,000 in cryptocurrency for his work. LockBit, known for its ties to Russian intelligence, has targeted governments, corporations, hospitals, and critical infrastructure using advanced ransomware techniques. Panev, arrested in Haifa in August 2024, was denied FBI questioning in Israel, and a gag order was imposed to prevent further suspects from fleeing. He is the third LockBit affiliate arrested, following Mikhail Vasiliev (Canada) and Ruslan Astamirov (U.S.), while the U.S. offers $10M for the capture of LockBit’s leader, Dmitry Khoroshev. <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://www.ynetnews.com/article/by9yfx4hyx" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ynetnews.com/article/by9yfx4hy</span><span class="invisible">x</span></a></p>
Tom Eston :verified:<p>Data overload got you down? </p><p>Tune into our latest <br><span class="h-card" translate="no"><a href="https://infosec.exchange/@sharedsecurity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sharedsecurity</span></a></span> podcast episode as we explore mastering vulnerability remediation with insights from experts Dahvid Schloss and Dan DeCloss from PlexTrac.</p><p>Watch on YouTube:<br><a href="https://youtu.be/_6B-zEp54a8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/_6B-zEp54a8</span><span class="invisible"></span></a></p><p>Listen and subscribe!<br><a href="https://sharedsecurity.net/2025/03/17/tackling-data-overload-strategies-for-effective-vulnerability-remediation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sharedsecurity.net/2025/03/17/</span><span class="invisible">tackling-data-overload-strategies-for-effective-vulnerability-remediation/</span></a></p><p><a href="https://sharedsecurity.net/subscribe" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sharedsecurity.net/subscribe</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcast</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/plextrac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plextrac</span></a></p>
Christoffer S.<p>It would appear as if Wiz may have discovered another supply-chain compromise:</p><p><a href="https://www.wiz.io/blog/new-github-action-supply-chain-attack-reviewdog-action-setup" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wiz.io/blog/new-github-action-</span><span class="invisible">supply-chain-attack-reviewdog-action-setup</span></a></p><p>The attack involved compromising the v1 tag of reviewdog/action-setup between March 11th 18:42 and 20:31 UTC. Unlike the tj-actions attack that used curl to retrieve a payload, this attack directly inserted a base64-encoded malicious payload into the install.sh file. When executed, the code dumped CI runner memory containing workflow secrets, which were then visible in logs as double-encoded base64 strings. The attack chain appears to have started with the compromise of reviewdog/action-setup, which was then used to compromise the tj-actions-bot Personal Access Token (PAT), ultimately leading to the compromise of tj-actions/changed-files. Organizations are advised to check for affected repositories using GitHub queries, examine workflow logs for evidence of compromise, rotate any leaked secrets, and implement preventive measures like pinning actions to specific commit hashes rather than version tags.</p><p><a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://swecyb.com/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChain</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Covenant is an open-source Command and Control framework designed for red team operations. Built in .NET Core, it supports cross-platform compatibility and multiple operators working simultaneously. It's a powerful tool, but keep in mind its ethical use depends on the intention behind it. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/cobbr/Covenant" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/cobbr/Covenant</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
The New Oil<p>Large enterprises scramble after supply-chain attack spills their secrets</p><p><a href="https://arstechnica.com/information-technology/2025/03/supply-chain-attack-exposing-credentials-affects-23k-users-of-tj-actions/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2025/03/supply-chain-attack-exposing-credentials-affects-23k-users-of-tj-actions/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a></p>
The New Oil<p>Consumer Groups Push New Law Fighting 'Zombie' <a href="https://mastodon.thenewoil.org/tags/IoT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoT</span></a> Devices</p><p><a href="https://yro.slashdot.org/story/25/03/17/0126204/consumer-groups-push-new-law-fighting-zombie-iot-devices" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">yro.slashdot.org/story/25/03/1</span><span class="invisible">7/0126204/consumer-groups-push-new-law-fighting-zombie-iot-devices</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>Fake "Security Alert" issues on <a href="https://mastodon.thenewoil.org/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> use <a href="https://mastodon.thenewoil.org/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> app to hijack accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>