social.cologne is one of the many independent Mastodon servers you can use to participate in the fediverse.
social.cologne is eine Mastodon Instanz für jede:n Kölner:in und alle, die sich mit Köln verbunden fühlen. Betrieben von https://cgnfs.de.

Administered by:

Server stats:

1.3K
active users

#Cybersecurity

469 posts237 participants63 posts today
David Yu<p>Are you a baseball fan? MLB has a Jr. Identity Security Analyst (Seasonal) position if you're into IAM.<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/entrylevel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>entrylevel</span></a> <a href="https://infosec.exchange/tags/jobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobs</span></a><br><a href="https://www.mlb.com/careers/opportunities?gh_jid=6692356" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mlb.com/careers/opportunities?</span><span class="invisible">gh_jid=6692356</span></a></p>
Hackread.com<p>🚨 Spyware added during manufacturing: Cheap Android phones come preloaded with malware stealing crypto via fake <a href="https://mstdn.social/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> and other apps.</p><p>Read: <a href="https://hackread.com/pre-installed-malware-cheap-android-phones-crypto-fake-whatsapp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/pre-installed-mal</span><span class="invisible">ware-cheap-android-phones-crypto-fake-whatsapp/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://mstdn.social/tags/Crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Crypto</span></a> <a href="https://mstdn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
BeyondMachines :verified:<p>State of (in)security - Week 15, 2025 <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/knowledge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>knowledge</span></a> <a href="https://infosec.exchange/tags/weeklyreport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weeklyreport</span></a><br><a href="https://beyondmachines.net/event_details/state-of-in-security-week-15-2025-g-h-k-o-o/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/state-of-in-security-week-15-2025-g-h-k-o-o/gD2P6Ple2L</span></a></p>
BGDoncaster<p>New supply chain attacks called "slopsquatting" in AI coding attempts to leverage AI models tendency to hallucinate non-existent package names.</p><p>Research indicates roughly 20% of the sampled Python and JavaScript code samples recommended packages didn't exist. </p><p><a href="https://www.bleepingcomputer.com/news/security/ai-hallucinated-code-dependencies-become-new-supply-chain-risk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/ai-hallucinated-code-dependencies-become-new-supply-chain-risk/</span></a> <a href="https://techhub.social/tags/slopsquatting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>slopsquatting</span></a> <a href="https://techhub.social/tags/hallucinations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hallucinations</span></a> <a href="https://techhub.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://techhub.social/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://techhub.social/tags/supplychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychain</span></a> <a href="https://techhub.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://techhub.social/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Inkican<p>Old-School Cypherpunk - the Cypherpunk Archives fill in a lot of institutional knowledge on 'why the Internet is the way that it is.'<br> <br><a href="https://inkican.com/sci-friday-222-old-school-cypherpunk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">inkican.com/sci-friday-222-old</span><span class="invisible">-school-cypherpunk/</span></a> </p><p><a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/hacked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacked</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
ResearchBuzz: Firehose<p>Palo Alto Online: Silicon Valley crosswalk buttons apparently hacked to imitate Musk, Zuckerberg voices. “In one video, taken on Saturday morning at the corner of Arguello Street, Broadway and Marshall Street in Redwood City, a voice claiming to be Zuckerberg says that ‘it’s normal to feel uncomfortable or even violated as we forcefully insert AI into every facet of your conscious […]</p><p><a href="https://rbfirehose.com/2025/04/14/palo-alto-online-silicon-valley-crosswalk-buttons-apparently-hacked-to-imitate-musk-zuckerberg-voices/" class="" rel="nofollow noopener noreferrer" target="_blank">https://rbfirehose.com/2025/04/14/palo-alto-online-silicon-valley-crosswalk-buttons-apparently-hacked-to-imitate-musk-zuckerberg-voices/</a></p>
Chum1ng0 - Security Research :verified:<p><a href="https://infosec.exchange/tags/Chile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chile</span></a> NightSpire Ransomware Active in Latin America: Emo Trans Chile S.A.</p><p>🔗 <a href="https://www.security-chu.com/2025/04/Emo-trans-Chile-atacado-por-NightSpire-ransomware.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-chu.com/2025/04/Emo-t</span><span class="invisible">rans-Chile-atacado-por-NightSpire-ransomware.html</span></a> </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/LATAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LATAM</span></a> <a href="https://infosec.exchange/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciberseguridad</span></a> <a href="https://infosec.exchange/tags/noticias" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>noticias</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
OTX Bot<p>Atomic and Exodus crypto wallets targeted in malicious npm campaign</p><p>A malicious npm package named pdf-to-office was discovered targeting cryptocurrency wallets. The package, posing as a PDF to Office converter, injects malicious code into locally installed Atomic and Exodus wallets. This attack modifies legitimate files to redirect crypto funds to the attacker's wallet. The campaign shows persistence, as removing the malicious package doesn't remove the injected code from the wallets. Multiple versions of both wallets were targeted, with the attackers adapting their code accordingly. This incident highlights the growing scope of software supply chain risks, particularly in the cryptocurrency industry, and emphasizes the need for improved monitoring of both source code repositories and locally deployed applications.</p><p>Pulse ID: 67fd41f7af4b02a0fd75fb69<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67fd41f7af4b02a0fd75fb69" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67fd4</span><span class="invisible">1f7af4b02a0fd75fb69</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-14 17:12:23</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Atomic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Atomic</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/NPM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NPM</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/Office" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Office</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PDF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PDF</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupplyChain</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
ApplSec<p>🧪 NEW BETA RELEASES 🧪</p><p>📱 iOS 18.5 beta 2 (22F5053f)<br>📱 iPadOS 18.5 beta 2 (22F5053f)<br>💻 macOS 15.5 beta 2 (24F5053f)<br>📺 tvOS 18.5 beta 2 (22L5553d)<br>🥽 visionOS 2.5 beta 2 (22O5453e)<br>⌚ watchOS 11.5 beta 2 (22T5553d)</p><p><a href="https://infosec.exchange/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a></p>
Matthias Schulze<p>Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices <a href="https://link.springer.com/article/10.1007/s10207-025-01027-x" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">link.springer.com/article/10.1</span><span class="invisible">007/s10207-025-01027-x</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Miguel Afonso Caetano<p>"When Let’s Encrypt, a free certificate authority, started issuing 90 day TLS certificates for websites, it was considered a bold move that helped push the ecosystem towards shorter certificate life times. Beforehand, certificate authorities normally issued certificate lifetimes lasting a year or more. With 4.0, Certbot is now supporting Let’s Encrypt’s new capability for six day certificates through ACME profiles and dynamic renewal at:</p><p> - 1/3rd of lifetime left<br> - 1/2 of lifetime left, if the lifetime is shorter than 10 days"</p><p><a href="https://www.eff.org/deeplinks/2025/04/certbot-40-long-live-short-lived-certs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eff.org/deeplinks/2025/04/cert</span><span class="invisible">bot-40-long-live-short-lived-certs</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://tldr.nettime.org/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://tldr.nettime.org/tags/Certbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Certbot</span></a> <a href="https://tldr.nettime.org/tags/LetsEncrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LetsEncrypt</span></a></p>
Wireshark<p>Ready to Master Wireshark? Join Chris Greer &amp; Ross Bagurdes for their 2 day Pre‑conference class I: Essential Wireshark Skills: Practical Packet Analysis at SharkFest’25 US &amp; EUROPE!</p><p>Dive into hands‑on labs covering ARP, TCP, HTTP, TLS &amp; more—perfect for beginners and seasoned pros alike. Don’t miss this chance to learn from the experts!</p><p>🔗 Secure your spot today: <a href="https://sharkfest.wireshark.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sharkfest.wireshark.org</span><span class="invisible"></span></a></p><p><a href="https://ioc.exchange/tags/SharkFest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharkFest</span></a> <a href="https://ioc.exchange/tags/sf25us" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sf25us</span></a> <a href="https://ioc.exchange/tags/sf25eu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sf25eu</span></a> <a href="https://ioc.exchange/tags/Wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireshark</span></a> <a href="https://ioc.exchange/tags/PacketAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PacketAnalysis</span></a> <a href="https://ioc.exchange/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://ioc.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
Cybersecurity Careers Blog :verified:<p>China confesses to Volt Typhoon role in U.S. infrastructure cyberattacks: Chinese officials admitted responsibility for escalating cyberattacks against U.S. infrastructure in secret talks held in Beijing in December 2024. <a href="https://cybr.ws/3XY3aIs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cybr.ws/3XY3aIs</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
cyberspace sin eater<p>-- Draw the Circle or Be Consumed --</p><p>&gt;OPSEC isn’t what happens before the real work. It is the real work that determines whether anything else becomes possible.&lt;</p><p>The universe doesn’t give a fuck about your intentions. Neither does any state’s surveillance apparatus. Both operate on cold deterministic principles that render your revolutionary potential to ash the moment you treat OPSEC as optional.</p><p>Let me be painfully clear: your movement will collapse with mathematical certainty unless security is the foundation, not the afterthought.</p><p>...</p><p>Read More:<br><a href="https://pixelnull.substack.com/p/draw-the-circle-or-be-consumed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pixelnull.substack.com/p/draw-</span><span class="invisible">the-circle-or-be-consumed</span></a></p><p><a href="https://infosec.exchange/tags/OPSECIsThePrimaryPraxis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPSECIsThePrimaryPraxis</span></a> <a href="https://infosec.exchange/tags/CybersecurityMutualAid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityMutualAid</span></a></p><p><a href="https://infosec.exchange/tags/praxis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>praxis</span></a> <a href="https://infosec.exchange/tags/mutualaid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mutualaid</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/opsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opsec</span></a> <a href="https://infosec.exchange/tags/ancom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ancom</span></a> <a href="https://infosec.exchange/tags/SurvaillanceState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SurvaillanceState</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/antiDFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>antiDFIR</span></a></p>
The New Oil<p>In Secret Meeting, <a href="https://mastodon.thenewoil.org/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> Acknowledged Role in U.S. <a href="https://mastodon.thenewoil.org/tags/Infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infrastructure</span></a> Hacks</p><p><a href="https://www.msn.com/en-us/news/world/in-secret-meeting-china-acknowledged-role-in-us-infrastructure-hacks/ar-AA1CGMb8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">msn.com/en-us/news/world/in-se</span><span class="invisible">cret-meeting-china-acknowledged-role-in-us-infrastructure-hacks/ar-AA1CGMb8</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/VoltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoltTyphoon</span></a></p>