snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

364
aktive brukere

#cisco

11 innlegg11 deltakereett innlegg i dag
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a>: Maximum-severity <a href="https://mastodon.thenewoil.org/tags/ISE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISE</span></a> RCE flaws now exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-maximum-severity-ise-rce-flaws-now-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-maximum-severity-ise-rce-flaws-now-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
jbz<p>📰 Cisco: The history you didn't hear - RetroBytes </p><p><a href="https://www.youtube.com/watch?v=NXTdwzjiW7E" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=NXTdwzjiW7E</span><span class="invisible"></span></a></p><p><a href="https://indieweb.social/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://indieweb.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://indieweb.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a></p>
heise online English<p>Cisco Identity Services Engine: Attack on old gaps – update now</p><p>In recent weeks, Cisco has closed critical ISE gaps – and now the company is warning of exploits. Anyone who has not yet patched should act immediately. </p><p><a href="https://www.heise.de/en/news/Cisco-Identity-Services-Engine-Attack-on-old-gaps-update-now-10497211.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Cisco-Identit</span><span class="invisible">y-Services-Engine-Attack-on-old-gaps-update-now-10497211.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Cisco Identity Services Engine: Angriff auf alte Lücken – jetzt Update nachholen</p><p>In den vergangenen Wochen schloss Cisco kritische ISE-Lücken – jetzt warnt das Unternehmen vor Exploits. Wer noch nicht gepatcht hat, sollte umgehend handeln. </p><p><a href="https://www.heise.de/news/Cisco-Identity-Services-Engine-Angriff-auf-alte-Luecken-jetzt-Update-nachholen-10497006.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cisco-Identity-S</span><span class="invisible">ervices-Engine-Angriff-auf-alte-Luecken-jetzt-Update-nachholen-10497006.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> confirms active exploitation of ISE and ISE-PIC flaws<br><a href="https://securityaffairs.com/180260/hacking/cisco-confirms-active-exploitation-of-ise-and-ise-pic-flaws.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180260/hac</span><span class="invisible">king/cisco-confirms-active-exploitation-of-ise-and-ise-pic-flaws.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Christoph Schmees<p>Schon wieder (!) Cisco 10 von 10 Risiko</p><p>Wieso eigentlich werden jetzt gerade so viele Hintertüren gefährliche Sicherheitslücken in Cisco-Produkten gefunden und durch Updates geschlossen? Schon wieder ist eine '10 von 10' Schwachstelle aufgetaucht. Deren Ursache? "insufficient validation of user-supplied input,</p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/07/19/schon-wieder-cisco-10-von-10-risiko/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/07/19/schon-wieder-cisco-10-von-10-risiko/</span></a></p><p><a href="https://social.tchncs.de/tags/Empfehlung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Empfehlung</span></a> <a href="https://social.tchncs.de/tags/Hintergrund" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hintergrund</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://social.tchncs.de/tags/politik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>politik</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/spionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spionage</span></a> <a href="https://social.tchncs.de/tags/UnplugTrump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnplugTrump</span></a> <a href="https://social.tchncs.de/tags/usa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>usa</span></a> <a href="https://social.tchncs.de/tags/wissen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wissen</span></a> <a href="https://social.tchncs.de/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a></p>
Brian Greenberg :verified:<p>🚨 Third critical Cisco ISE flaw in a month. Another perfect 10 CVSS score, another no-workaround RCE. If you’re still running ISE 3.3 or 3.4 without the latest patches, you’re leaving the door wide open for remote root access via a crafted API request.</p><p>TL;DR<br>⚠️ CVE-2025-20337 = unauthenticated RCE<br>🚨 Exploit = remote root with no workaround<br>🛠️ Fix = Patch 3.3.7 or 3.4.2<br>🔍 No active exploitation... yet</p><p><a href="https://www.theregister.com/2025/07/17/critical_cisco_bug/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/07/17/cri</span><span class="invisible">tical_cisco_bug/</span></a><br><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>Max severity <a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://mastodon.thenewoil.org/tags/ISE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISE</span></a> bug allows pre-auth command execution, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/max-severity-cisco-ise-bug-allows-pre-auth-command-execution-patch-now/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/max-severity-cisco-ise-bug-allows-pre-auth-command-execution-patch-now/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> patches critical CVE-2025-20337 bug in Identity Services Engine with CVSS 10 Severity<br><a href="https://securityaffairs.com/180044/security/cisco-patches-critical-cve-2025-20337-bug-in-identity-services-engine-with-cvss-10-severity.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180044/sec</span><span class="invisible">urity/cisco-patches-critical-cve-2025-20337-bug-in-identity-services-engine-with-cvss-10-severity.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/ISE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISE</span></a></p>
heise online English<p>Another critical vulnerability in Cisco's ISE</p><p>There is another vulnerability in Cisco's ISE with a maximum threat rating. Cisco also warns of further vulnerabilities in more products.</p><p><a href="https://www.heise.de/en/news/Another-critical-vulnerability-in-Cisco-s-ISE-10490706.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Another-criti</span><span class="invisible">cal-vulnerability-in-Cisco-s-ISE-10490706.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Weitere kritische Lücke in Ciscos ISE</p><p>In Ciscos ISE klafft eine weitere Lücke mit maximalem Bedrohungsgrad. Zudem warnt Cisco vor weiteren Lücken in mehr Produkten.</p><p><a href="https://www.heise.de/news/Weitere-kritische-Luecke-in-Ciscos-ISE-10490589.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Weitere-kritisch</span><span class="invisible">e-Luecke-in-Ciscos-ISE-10490589.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Jody Lemoine 🇨🇦<p>I was just having a discussion on one of Orhan Ergun’s posts on LinkedIn about “no dns lookup” vs “transport preferred none” in a <a href="https://hachyderm.io/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://hachyderm.io/tags/IOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOS</span></a> configuration. I thought it deserved a wider distribution, so here I am.</p><p>Lots of folks disable name lookups on Cisco IOS boxen to prevent the device from attempting to resolve mistyped commands as host names. Unfortunately, this disables name lookup for •all• functions on the device, which can break a few important things.</p><p>Rather than disabling name lookups entirely, I recommend turning off the device’s default behaviour for mistyped commands, which is to treat them as host names and to connect to them via telnet or rlogin, which can include a name lookup.</p><p>Configuring “transport preferred none” on the con and vty lines will give the device no transport protocol to use for such connections and it won’t bother to try, eliminating the name lookup problem with mistyped commands while preserving lookups for other functions.</p><p><a href="https://hachyderm.io/tags/NetEng" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetEng</span></a></p>
[ ] ground zero<p>watch the great talk from Dr. Abeba Birhane at the AI for Good Global Summit in Geneva here: <a href="https://www.youtube.com/watch?v=K-AOgG6sc9Q&amp;t=4828s" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=K-AOgG6sc9</span><span class="invisible">Q&amp;t=4828s</span></a><br>Thanks <span class="h-card" translate="no"><a href="https://scholar.social/@abebab" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>abebab</span></a></span> for speaking truth to power! <br>The AI for Good organizers tried to silence her. In her own words "One of the main concerns for them was that in one of the slides I had indicated "No AI for War Crimes", and it had logos of <a href="https://tldr.nettime.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a>, <a href="https://tldr.nettime.org/tags/Amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amazon</span></a>, <a href="https://tldr.nettime.org/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> Cloud, <a href="https://tldr.nettime.org/tags/Palantir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Palantir</span></a> and <a href="https://tldr.nettime.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a>; they wanted me to remove that... while existing records clearly show that they are working with authoritarian regimes to provide cloud infrastructure and various technologies that are powering war and exacerbating injustice."<br>Read article "AI for Good [Appearance?]" by Dr. Abeba Birhane: <a href="https://aial.ie/blog/2025-ai-for-good-summit/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aial.ie/blog/2025-ai-for-good-</span><span class="invisible">summit/</span></a><br>...below you'll find a screenshot of a modified version of another slide that shows how the organisers censored:</p>
Nagaram<p>I am job hunting if anyone is looking for an <a href="https://hachyderm.io/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://hachyderm.io/tags/engineer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineer</span></a></p><p>I currently work in Mergers and Acquisitions as an IT specialist in the embroidery field, but I have experience with <a href="https://hachyderm.io/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://hachyderm.io/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> including their Firepower ASA and their switches. I am also an <a href="https://hachyderm.io/tags/MDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MDM</span></a> engineer and I am the team lead for SOP writing and development.</p><p>I would like to get back into a <a href="https://hachyderm.io/tags/datacenter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datacenter</span></a> job. I am comfortable with <a href="https://hachyderm.io/tags/travel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>travel</span></a> and I'm comfortable with <a href="https://hachyderm.io/tags/parttime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>parttime</span></a> and <a href="https://hachyderm.io/tags/contract" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>contract</span></a> work if you have any recommendations.</p><p>I won't do defence companies though.</p><p><a href="https://hachyderm.io/tags/FediHire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FediHire</span></a> <a href="https://hachyderm.io/tags/getfedihired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>getfedihired</span></a> <a href="https://hachyderm.io/tags/jobhunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jobhunting</span></a> <a href="https://hachyderm.io/tags/infrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infrastructure</span></a></p>
DrScriptt<p>I wrote some <a href="https://oldbytes.space/tags/awk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>awk</span></a> to parse output from `show interface` on <a href="https://oldbytes.space/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> IOS devices this evening as one does.</p><p>It expands the ~27 lines of dense text with multiple values on each line to be 68 discrete data points that can be worked with.</p>
Kit 🔻<p>No pride in genocide, Cisco</p><p>Youth Demand group disrupts the Cisco’s float as part of London pride, pointing out how the company of is complicit in genocide and “hiding their crimes behind a veil of pink washing”: <a href="https://www.independent.co.uk/news/uk/home-news/london-pride-palestine-protest-youth-demand-b2783254.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">independent.co.uk/news/uk/home</span><span class="invisible">-news/london-pride-palestine-protest-youth-demand-b2783254.html</span></a></p><p><a href="https://infosec.exchange/tags/pride" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pride</span></a> <a href="https://infosec.exchange/tags/London" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>London</span></a> <a href="https://infosec.exchange/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://infosec.exchange/tags/FreePalestine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreePalestine</span></a></p>
it's kat! 🇵🇸✊<p>youth demand supporters repaint cisco's float at london pride. cisco has a long-standing partnership with the isra*li military. <br>they were arrested, of course, but this is how we win: solidarity. be ready to rise when the establishment tries to silence our comrades.<br><a href="https://mstdn.social/tags/youthDemand" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>youthDemand</span></a> <a href="https://mstdn.social/tags/london" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>london</span></a> <a href="https://mstdn.social/tags/pride" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pride</span></a> <a href="https://mstdn.social/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://mstdn.social/tags/gaza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gaza</span></a> <a href="https://mstdn.social/tags/palestine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>palestine</span></a> <br><a href="https://yewtu.be/watch?v=GaGJXS4muj4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">yewtu.be/watch?v=GaGJXS4muj4</span><span class="invisible"></span></a></p>
Dag<p>Hilarious walk trough of the <a href="https://snabelen.no/tags/Windows" class="mention hashtag" rel="tag">#<span>Windows</span></a> Unexpected Restart Experience <a href="https://snabelen.no/tags/URD" class="mention hashtag" rel="tag">#<span>URD</span></a></p><p>Also talking about the Windows 10 support mess and new <a href="https://snabelen.no/tags/Cisco" class="mention hashtag" rel="tag">#<span>Cisco</span></a> flaw.</p><p>But I must add to why <a href="https://snabelen.no/tags/European" class="mention hashtag" rel="tag">#<span>European</span></a> companies and govs flees Microsoft that they are afraid US tech services will be politically <a href="https://snabelen.no/tags/weaponized" class="mention hashtag" rel="tag">#<span>weaponized</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@SGgrc" class="u-url mention">@<span>SGgrc</span></a></span> </p><p><a href="https://twit.tv/shows/security-now/episodes/1032?autostart=false" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">twit.tv/shows/security-now/epi</span><span class="invisible">sodes/1032?autostart=false</span></a><br /><a href="https://snabelen.no/tags/SecurityNow" class="mention hashtag" rel="tag">#<span>SecurityNow</span></a> <a href="https://snabelen.no/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://snabelen.no/tags/microsoft" class="mention hashtag" rel="tag">#<span>microsoft</span></a></p>
jbz<p>⚠️ Cisco warns of a serious security flaw in comms platform - and that it needs patching immediately </p><p>「 Another hardcoded credential for admin access has been discovered in a major software application - this time around it’s Cisco, who discovered the slip-up in its Unified Communications Manager (Unified CM) solution 」 </p><p><a href="https://www.techradar.com/pro/security/cisco-warns-of-a-serious-security-flaw-in-comms-platform-and-that-it-needs-patching-immediately" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/cis</span><span class="invisible">co-warns-of-a-serious-security-flaw-in-comms-platform-and-that-it-needs-patching-immediately</span></a> </p><p><a href="https://indieweb.social/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://indieweb.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Canada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canada</span></a> says <a href="https://hachyderm.io/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SaltTyphoon</span></a> hacked <a href="https://hachyderm.io/tags/telecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telecom</span></a> firm via <a href="https://hachyderm.io/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> flaw<br>The flaw was first disclosed in October 2023, when it was reported that threat actors had exploited it as a zero-day to hack over 10,000 devices.<br>Despite a significant period having passed, at least one major <a href="https://hachyderm.io/tags/telecommunications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telecommunications</span></a> provider in Canada still hadn't patched, giving Salt Typhoon an easy way to compromise devices. <br><a href="https://www.bleepingcomputer.com/news/security/canada-says-salt-typhoon-hacked-telecom-firm-via-cisco-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/canada-says-salt-typhoon-hacked-telecom-firm-via-cisco-flaw/</span></a></p>