det.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon Server des Unterhaltungsfernsehen Ehrenfeld zum dezentralen Diskurs.

Administered by:

Server stats:

1.8K
active users

#cloudsecurity

2 posts2 participants0 posts today
InfoQ<p>This <a href="https://techhub.social/tags/InfoQ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoQ</span></a> video explores One Network - <a href="https://techhub.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a>'s unified service networking architecture!</p><p>Dive into its open-source roots, global traffic management, and plans for multi-cloud and mobile integration.</p><p>➡️ Watch now: <a href="https://bit.ly/4kMJLTg" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4kMJLTg</span><span class="invisible"></span></a> </p><p>📄 <a href="https://techhub.social/tags/transcript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transcript</span></a> included</p><p><a href="https://techhub.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://techhub.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://techhub.social/tags/Infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infrastructure</span></a> <a href="https://techhub.social/tags/CaseStudy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaseStudy</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Grype is a vulnerability scanner for container images and filesystems. It supports various sources like Docker images, SBOMs, and directories, detecting known vulnerabilities rapidly. Integrates well with CI pipelines. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/anchore/grype" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/anchore/grype</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Bytes Europe<p>Japan Cyber Security Market Trends Analysis Report 2025-2030 <a href="https://www.byteseu.com/1186727/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/1186727/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://pubeurope.com/tags/CriticalSectors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalSectors</span></a> <a href="https://pubeurope.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://pubeurope.com/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreats</span></a> <a href="https://pubeurope.com/tags/DigitalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalInfrastructure</span></a> <a href="https://pubeurope.com/tags/Japan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Japan</span></a> <a href="https://pubeurope.com/tags/MarketDynamics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MarketDynamics</span></a> <a href="https://pubeurope.com/tags/MarketGrowth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MarketGrowth</span></a> <a href="https://pubeurope.com/tags/OrganizationSize" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OrganizationSize</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2236616/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2236616/</span><span class="invisible"></span></a> Japan Cyber Security Market Trends Analysis Report 2025-2030 <a href="https://pubeurope.com/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://pubeurope.com/tags/CriticalSectors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalSectors</span></a> <a href="https://pubeurope.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://pubeurope.com/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreats</span></a> <a href="https://pubeurope.com/tags/DigitalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalInfrastructure</span></a> <a href="https://pubeurope.com/tags/japan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>japan</span></a> <a href="https://pubeurope.com/tags/MarketDynamics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MarketDynamics</span></a> <a href="https://pubeurope.com/tags/MarketGrowth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MarketGrowth</span></a> <a href="https://pubeurope.com/tags/OrganizationSize" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OrganizationSize</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Scrapling is redefining Python web scraping. Adaptive, stealthy, and fast, it can bypass anti-bot measures while auto-tracking changes in website structure. A standout: 4.5x faster than AutoScraper for text-based extractions. <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/WebScraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebScraping</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/D4Vinci/Scrapling" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/D4Vinci/Scrapling</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI <a href="http://dlvr.it/TLmF6P" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TLmF6P</span><span class="invisible"></span></a> <a href="https://kolektiva.social/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kolektiva.social/tags/ISE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISE</span></a> <a href="https://kolektiva.social/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://kolektiva.social/tags/AWSSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWSSecurity</span></a></p>
Netzpalaver<p>Unternehmen haben Schwierigkeiten ihre wachsenden, KI-gesteuerten Cloud-Umgebungen abzusichern</p><p><a href="https://social.tchncs.de/tags/451Research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>451Research</span></a> <a href="https://social.tchncs.de/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://social.tchncs.de/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://social.tchncs.de/tags/CloudSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSicherheit</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://social.tchncs.de/tags/KISicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KISicherheit</span></a> <a href="https://social.tchncs.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> @Thales</p><p><a href="https://netzpalaver.de/2025/06/30/unternehmen-haben-schwierigkeiten-ihre-wachsenden-ki-gesteuerten-cloud-umgebungen-abzusichern/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/06/30/unte</span><span class="invisible">rnehmen-haben-schwierigkeiten-ihre-wachsenden-ki-gesteuerten-cloud-umgebungen-abzusichern/</span></a></p>
Netzpalaver<p>KI-Analyst für Cloud-Sicherheit</p><p><a href="https://social.tchncs.de/tags/CloudSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSicherheit</span></a> <a href="https://social.tchncs.de/tags/CNAPP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CNAPP</span></a> <a href="https://social.tchncs.de/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://social.tchncs.de/tags/KIAnalyst" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KIAnalyst</span></a> <a href="https://social.tchncs.de/tags/k%C3%BCnstlicheIntelligenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>künstlicheIntelligenz</span></a> <a href="https://social.tchncs.de/tags/Softwareentwicklung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Softwareentwicklung</span></a> @Sysdig <a href="https://social.tchncs.de/tags/SysdigSage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysdigSage</span></a> <a href="https://social.tchncs.de/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a></p><p><a href="https://netzpalaver.de/2025/06/27/ki-analyst-fuer-cloud-sicherheit/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/06/27/ki-a</span><span class="invisible">nalyst-fuer-cloud-sicherheit/</span></a></p>
Netzpalaver<p>Allgegenwärtige Fehlkonfigurationen in Cloud-Umgebungen gefährden kritische Daten und vertrauliche Informationen</p><p><a href="https://social.tchncs.de/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://social.tchncs.de/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://social.tchncs.de/tags/CloudSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSicherheit</span></a> CloudSpeicher <a href="https://social.tchncs.de/tags/Fehlkonfiguration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fehlkonfiguration</span></a> <a href="https://social.tchncs.de/tags/Schwachstelle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Schwachstelle</span></a> @Tenable</p><p><a href="https://netzpalaver.de/2025/06/23/allgegenwaertige-fehlkonfigurationen-in-cloud-umgebungen-gefaehrden-kritische-daten-und-vertrauliche-informationen/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/06/23/allg</span><span class="invisible">egenwaertige-fehlkonfigurationen-in-cloud-umgebungen-gefaehrden-kritische-daten-und-vertrauliche-informationen/</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Transform any URL into an LLM-ready input with `Reader`. Just prefix the URL with `<a href="https://r.jina.ai/`" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">r.jina.ai/`</span><span class="invisible"></span></a> for clean, readable content extraction. Perfect for enhancing agents &amp; RAG pipelines. <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> <a href="https://infosec.exchange/tags/NLP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NLP</span></a></p><p>Need web search results for your LLM? Prepend queries with `<a href="https://s.jina.ai/`" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">s.jina.ai/`</span><span class="invisible"></span></a> to fetch top results—content included. E.g., `<a href="https://s.jina.ai/your+query`" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">s.jina.ai/your+query`</span><span class="invisible"></span></a> brings knowledge directly to your model. <a href="https://infosec.exchange/tags/AItools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AItools</span></a> <a href="https://infosec.exchange/tags/DataEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataEngineering</span></a> </p><p>Reader API now supports images! Captions are auto-generated for images missing alt tags, giving LLMs better context for reasoning and summarizing multimedia pages. <a href="https://infosec.exchange/tags/MachineLearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MachineLearning</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/jina-ai/reader" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/jina-ai/reader</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Europe Says<p><a href="https://www.europesays.com/2169664/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2169664/</span><span class="invisible"></span></a> Citrix Parent CEO Krause Leaves DOGE, US Treasury Posts <a href="https://pubeurope.com/tags/ApplicationAndPlatformSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApplicationAndPlatformSecurity</span></a> <a href="https://pubeurope.com/tags/CloudPlatforms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudPlatforms</span></a> <a href="https://pubeurope.com/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://pubeurope.com/tags/CloudSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSoftware</span></a> <a href="https://pubeurope.com/tags/DepartmentOfGovernmentEfficiency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DepartmentOfGovernmentEfficiency</span></a> <a href="https://pubeurope.com/tags/DesktopClients" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DesktopClients</span></a> <a href="https://pubeurope.com/tags/doge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>doge</span></a> <a href="https://pubeurope.com/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://pubeurope.com/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://pubeurope.com/tags/ManagedSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ManagedSecurity</span></a> <a href="https://pubeurope.com/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://pubeurope.com/tags/Notebooks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Notebooks</span></a></p>
SecuritySnacks<p>ICYMI: DomainTools Investigations released new research this week!</p><p>Skeleton Spider (aka FIN6) is leveraging trusted cloud services like AWS to deliver malware through fake job applications and resume-themed phishing campaigns.</p><p>🔍 Learn how this financially motivated group is:</p><p>🔹Exploiting cloud infrastructure to evade detection<br>🔹Using social engineering to lure victims<br>🔹Building resilient, scalable malware delivery systems</p><p>Read the full analysis here: <a href="https://dti.domaintools.com/skeleton-spider-trusted-cloud-malware-delivery/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=Skeleton-Spider" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dti.domaintools.com/skeleton-s</span><span class="invisible">pider-trusted-cloud-malware-delivery/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=Skeleton-Spider</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/FIN6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIN6</span></a> <a href="https://infosec.exchange/tags/SkeletonSpider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SkeletonSpider</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>
SecuritySnacks<p>Cybercrime group FIN6 (aka Skeleton Spider) is leveraging trusted cloud services like AWS to deliver malware through fake job applications.</p><p>Our latest analysis breaks down: <br>🔹 How attackers use LinkedIn &amp; Indeed to build trust<br>🔹 The use of resume-themed phishing lures<br>🔹 Cloud-hosted infrastructure that evades detection<br>🔹 The delivery of the More_eggs backdoor via .LNK files<br>🔹 Key defense strategies for recruiters and security teams</p><p>This campaign is a masterclass in low-complexity, high-evasion phishing</p><p>📖 Read the full breakdown: <a href="https://dti.domaintools.com/skeleton-spider-trusted-cloud-malware-delivery/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=Skeleton-Spider" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dti.domaintools.com/skeleton-s</span><span class="invisible">pider-trusted-cloud-malware-delivery/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=Skeleton-Spider</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/FIN6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIN6</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/SkeletonSpider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SkeletonSpider</span></a></p>
Netzpalaver<p>Gefährliche Schwachstellen kosten Zeit, Vertrauen und Flexibilität</p><p><a href="https://social.tchncs.de/tags/Anwendungssicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anwendungssicherheit</span></a> <a href="https://social.tchncs.de/tags/CheckPointSW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CheckPointSW</span></a> <a href="https://social.tchncs.de/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://social.tchncs.de/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a>-Report <a href="https://social.tchncs.de/tags/CloudSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSicherheit</span></a> <a href="https://social.tchncs.de/tags/Cyberresilienz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberresilienz</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/KIBedrohung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KIBedrohung</span></a> <a href="https://social.tchncs.de/tags/k%C3%BCnstlicheIntelligenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>künstlicheIntelligenz</span></a> <a href="https://social.tchncs.de/tags/MultiCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MultiCloud</span></a></p><p><a href="https://netzpalaver.de/2025/06/10/gefaehrliche-schwachstellen-kosten-zeit-vertrauen-und-flexibilitaet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/06/10/gefa</span><span class="invisible">ehrliche-schwachstellen-kosten-zeit-vertrauen-und-flexibilitaet/</span></a></p>
Cryptomator<p>🚀 Fresh Redesign. Better Navigation. Same Mission.</p><p>Our documentation page just got a major upgrade!</p><p>📱 Quick access to platform-specific guides<br>🧭 Easier navigation<br>🌗 Light or dark mode<br>📝 Now using Markdown again — making it easier than ever to contribute!</p><p>➡️ Take a look at the redesign in our before-and-after comparison and explore the new experience: <a href="https://docs.cryptomator.org?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=docs-redesign" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.cryptomator.org?utm_sourc</span><span class="invisible">e=mastodon&amp;utm_medium=social&amp;utm_campaign=docs-redesign</span></a></p><p><a href="https://mastodon.online/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptomator</span></a> <a href="https://mastodon.online/tags/PrivacyMatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyMatters</span></a> <a href="https://mastodon.online/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.online/tags/Redesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Redesign</span></a> <a href="https://mastodon.online/tags/UserExperience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UserExperience</span></a> <a href="https://mastodon.online/tags/DarkMode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkMode</span></a> <a href="https://mastodon.online/tags/Documentation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Documentation</span></a> <a href="https://mastodon.online/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Kubernetes History Inspector (KHI) is an agentless log viewer built for visualizing Kubernetes audit logs. Its timeline-based log analysis and resource relationship diagrams simplify cluster troubleshooting—no complex setups or commands required. <a href="https://infosec.exchange/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubernetes</span></a> <a href="https://infosec.exchange/tags/Observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Observability</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/GoogleCloudPlatform/khi" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/GoogleCloudPlatform</span><span class="invisible">/khi</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
nemo™ 🇺🇦<p>🚨 Hackers are abusing Mullvad VPN to steal Salesforce data from companies! Google’s GTIG warns that group UNC6040 uses vishing &amp; fake apps to exfiltrate sensitive info, hiding behind privacy tools. Stay vigilant! 🔒👀<br>Read more: <a href="https://cyberinsider.com/hackers-abuse-mullvad-vpn-to-steal-salesforce-data-from-companies/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/hackers-abuse</span><span class="invisible">-mullvad-vpn-to-steal-salesforce-data-from-companies/</span></a><br><a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://mas.to/tags/Salesforce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Salesforce</span></a> <a href="https://mas.to/tags/MullvadVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MullvadVPN</span></a> <a href="https://mas.to/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://mas.to/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://mas.to/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>tfmcp simplifies Terraform management by letting AI assistants like Claude Desktop handle config, plans, and state via the Model Context Protocol (MCP). Built with Rust, it offers robust security, Docker support, and detailed analysis. ⚙️ <a href="https://infosec.exchange/tags/Terraform" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Terraform</span></a> <a href="https://infosec.exchange/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/nwiizo/tfmcp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/nwiizo/tfmcp</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
paul<p>The 16-30 January <a href="https://infosec.exchange/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattacks</span></a> timeline is out with 107 events and a <a href="https://infosec.exchange/tags/threat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threat</span></a> landscape dominated by <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> and <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a>. <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> emails continued to lead the initial access techniques.</p><p><a href="https://www.hackmageddon.com/2025/06/04/16-30-january-cyber-attacks-timeline/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackmageddon.com/2025/06/04/16</span><span class="invisible">-30-january-cyber-attacks-timeline/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p>
Cryptomator<p>🔐 Cryptomator vs. VeraCrypt — which encryption tool is right for you?</p><p>We’ve compared both in a detailed breakdown of their use cases, strengths, and key differences — especially when it comes to cloud storage and user-friendliness.</p><p>👉 Read the full comparison now: <a href="https://cryptomator.org/comparisons/veracrypt-alternative/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=veracrypt-comparison" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryptomator.org/comparisons/ve</span><span class="invisible">racrypt-alternative/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=veracrypt-comparison</span></a></p><p><a href="https://mastodon.online/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.online/tags/PrivacyTools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyTools</span></a> <a href="https://mastodon.online/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptomator</span></a> <a href="https://mastodon.online/tags/VeraCrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VeraCrypt</span></a> <a href="https://mastodon.online/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://mastodon.online/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>