mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

743
active users

#infosec

404 posts165 participants52 posts today
InfoSecSherpa<p>My 2025 Q3 <a href="https://infosec.exchange/tags/Africa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Africa</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> &amp; <a href="https://infosec.exchange/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataPrivacy</span></a> news roundup is available! News items curated to keep you on top of <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> in this region!</p><p>Africa Information Security News Roundup for July-September 2025<br><a href="https://sherpaintelligence.substack.com/p/africa-information-security-news-104" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sherpaintelligence.substack.co</span><span class="invisible">m/p/africa-information-security-news-104</span></a></p>
Neil Craig<p>Pleasantly surprised to find out that our commercial web CDN partner for www.bbc.com &amp; www.bbc.co.uk has enabled Post-Quantum Crypto.</p><p>So if you're using a modern web browser (Chromium &amp; Firefox both support it) &amp; are outside the UK, you'll automatically be using a quantum computer-resistant TLS key exchange mechanism (ML-KEM AKA Kyber) and (as far as we know) your traffic cannot be intercepted, stored &amp; latterly decrypted when viable quantum computers come along.</p><p><a href="https://mastodon.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://mastodon.social/tags/PQC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PQC</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a></p>
alios<p>Never fuck up user experience with information security arguments, because users will start looking for workarounds to fix fucked up user experience and if they succeed, the introduced attack vector is often much worse then the attack vector you tried to close.</p><p>So if you are trying to close an attack vector by implementing $something, evaluate if it fucks up the UX, if it does, provide an alternative, if you are not able to, drop $something and start again.</p><p><a href="https://23.social/tags/ChatControl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatControl</span></a> <a href="https://23.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS197540<br>Location: Nürnberg, DE<br>Added: 2025-09-30T12:45</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: incransom<br>Post title: callhci.com<br>Info: <a href="https://cti.fyi/groups/incransom.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/incransom.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Diego Córdoba 🇦🇷<p>¿Que las redes TCP/IP son aburridas?</p><p>Acabo de hacer un ping desde un cliente virtual, hasta un servidor remoto, con una IP de origen modificada de un tercer equipo, llamémosle X.</p><p>El ping pasa por un firewall que no tiene sNAT activado.</p><p>El ping llega al servidor remoto, y éste lo responde a X.</p><p>Un ataque "ICMP reflection flood" casero 🙂</p><p><a href="https://mstdn.io/tags/gnu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnu</span></a> <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/learning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>learning</span></a> <a href="https://mstdn.io/tags/juncotic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>juncotic</span></a> <a href="https://mstdn.io/tags/educacion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>educacion</span></a> <a href="https://mstdn.io/tags/softwarelibre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarelibre</span></a> <a href="https://mstdn.io/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mstdn.io/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://mstdn.io/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://mstdn.io/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mstdn.io/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mstdn.io/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mstdn.io/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a></p>
Shodan Safari<p>ASN: AS135377<br>Location: Taipei, TW<br>Added: 2025-09-30T13:07</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Quad9DNS<p>Heading to <a href="https://mastodon.social/tags/OARC45" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OARC45</span></a> next week? We'll be there! 🇸🇪 </p><p>Join us for the ADoT/ADoQ: Deployment Collaboration Table Topic</p><p><a href="https://mastodns.net/@dnsoarc/115295189910398791" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodns.net/@dnsoarc/11529518</span><span class="invisible">9910398791</span></a></p><p><a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.social/tags/LoveDNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LoveDNS</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Neil Craig<p>We're seeing requests to www.bbc.com return to normal-looking levels from Afghanistan - since about midday UTC today (1st Oct 2025).</p><p><a href="https://mastodon.social/tags/Afghanistan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Afghanistan</span></a> <a href="https://mastodon.social/tags/Censorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Censorship</span></a> <a href="https://mastodon.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDev</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/Taliban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Taliban</span></a></p>
Ge0rG<p>Security is like fashion. Old trends come back periodically.</p><p>Exhibit A: "security" appliance vendors suffering from ../../ exploits in 2025</p><p>Exhibit B: <a href="https://wiretap.fail/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">wiretap.fail/</span><span class="invisible"></span></a> is just <span class="h-card" translate="no"><a href="https://social.treehouse.systems/@bunnie" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bunnie</span></a></span> 's 2002 sniffing of HyperTransport on the first Xbox - <a href="https://www.bunniestudios.com/bunnie/proj/anatak/AIM-2002-008.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bunniestudios.com/bunnie/proj/</span><span class="invisible">anatak/AIM-2002-008.pdf</span></a></p><p><a href="https://chaos.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://chaos.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://chaos.social/tags/WiretapFail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiretapFail</span></a></p>
ZaufanaTrzeciaStrona.pl<p>Poznaj prawne i etyczne aspekty działalności hakerskiej - od wolności słowa, przez kwestie przestępstw komputerowych, po regulacje dotyczące inżynierii wstecznej. Zbigniew Krüger, pełnomocnik Dragon Sector w sprawie Newagu, omówił te kwestie podczas <a href="https://infosec.exchange/tags/OMH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OMH</span></a> 2024! </p><p>▶️ <a href="https://www.youtube.com/watch?v=RvhPjXpA2qI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=RvhPjXpA2qI</span><span class="invisible"></span></a> </p><p>Najgorętsze tematy z branży <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> - więcej na <a href="https://infosec.exchange/tags/OhMyHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OhMyHack</span></a> 2025! <br>🎫 Nie przegap konferencji - rejestracja w toku ➡️ <a href="https://bit.ly/OMHbilet" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/OMHbilet</span><span class="invisible"></span></a> </p><p><a href="https://infosec.exchange/tags/OMHconf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OMHconf</span></a> <a href="https://infosec.exchange/tags/cyberbezpieczenstwo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberbezpieczenstwo</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
OWASP Foundation<p>🚨 Attention AppSec pros!</p><p>OWASP Global AppSec US 2025 is coming to Washington, D.C. this November, and it’s the must-attend event for anyone in application security.</p><p>🔗 Register now: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASP2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP2025</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/GlobalAppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlobalAppSec</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WashingtonDC</span></a></p>
Shodan Safari<p>ASN: AS5607<br>Location: Worcester, GB<br>Added: 2025-09-30T12:48</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: incransom<br>Post title: Climatron<br>Info: <a href="https://cti.fyi/groups/incransom.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/incransom.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
FastRuby.io<p>Today, October 1st, <a href="https://ruby.social/tags/Rails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rails</span></a> 7.1 reaches the end of its security support. That means that if you're running this version in production, you won't get any more security patches from the core team.</p><p>Need to upgrade to Rails 7.2? Follow our step by step guide: <a href="https://www.fastruby.io/blog/upgrade-rails-7-1-to-7-2.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fastruby.io/blog/upgrade-rails</span><span class="invisible">-7-1-to-7-2.html</span></a> </p><p><a href="https://ruby.social/tags/UpgradeRails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UpgradeRails</span></a> <a href="https://ruby.social/tags/TechDebt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechDebt</span></a> <a href="https://ruby.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://ruby.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a></p>
Stephen Foskett<p>Here’s a really great open report on the use of <a href="https://techfieldday.net/tags/GenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenAI</span></a> by scammers. Required reading for <a href="https://techfieldday.net/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> pros and similar folks. And a decent read for normals too. </p><p><a href="https://datasociety.net/library/scam-gpt/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datasociety.net/library/scam-g</span><span class="invisible">pt/</span></a></p>
BeyondMachines :verified:<p>Superior Vision Services hit by email phishing attack, exposes data of health plan members</p><p>Superior Vision Services, a New York-based vision benefit provider, suffered an email phishing attack on July 9, 2025 that granted attackers access to internal email accounts containing sensitive member information. The company disclose dthe incident to regulators in late September 2025, offering affected individuals one year of credit monitoring services.</p><p>****<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/incident" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incident</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a><br><a href="https://beyondmachines.net/event_details/superior-vision-services-hit-by-email-phishing-attack-exposes-data-of-health-plan-members-g-n-u-h-9/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/superior-vision-services-hit-by-email-phishing-attack-exposes-data-of-health-plan-members-g-n-u-h-9/gD2P6Ple2L</span></a></p>
Shodan Safari<p>ASN: AS55990<br>Location: Shanghai, CN<br>Added: 2025-09-30T12:52</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
BeyondMachines :verified:<p>Scanning campaign targets critical Palo Alto GlobalProtect vulnerability</p><p>Security researchers detected a significant surge in exploitation attempts targeting CVE-2024-3400, a critical arbitrary file creation vulnerability in Palo Alto Networks PAN-OS GlobalProtect that allows unauthenticated attackers to execute arbitrary code with root privileges on firewalls running versions 10.2, 11.0, and 11.1. Thousands of automated scanning attempts have been observed since late September 2025.</p><p>**If you still haven't patched your Palo Alto Networks firewalls with GlobalProtect VPN since 2024, you are probably hacked. Nevertheless, make sure to update IMMEDIATELY. Also check for indicators of compromise and if you have any suspicion, make a full factory-reset per Palo Alto support instructions.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/scanning-campaign-targets-critical-palo-alto-globalprotect-vulnerability-m-9-v-8-z/gD2P6Ple2L" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/scanning-campaign-targets-critical-palo-alto-globalprotect-vulnerability-m-9-v-8-z/gD2P6Ple2L</span></a></p>
Shodan Safari<p>ASN: AS14956<br>Location: Miami, US<br>Added: 2025-09-30T12:46</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>