snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

383
aktive brukere

#infosec

435 innlegg215 deltakere5 innlegg i dag
Shodan Safari<p>ASN: AS36352<br>Location: Buffalo, US<br>Added: 2025-08-13T01:57</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS24940<br>Location: Falkenstein, DE<br>Added: 2025-08-13T01:55</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Global operation targets NoName057(16) pro-Russian cybercrime network <a href="http://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">http://www.</span><span class="ellipsis">europol.europa.eu/media-press/</span><span class="invisible">newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS44493<br>Location: Chelyabinsk, RU<br>Added: 2025-08-13T01:49</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS37613<br>Location: Accra, GH<br>Added: 2025-08-13T01:56</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Forget the Space Force! Trump needs to create a Cyber Force, says think tank <a href="https://go.theregister.com/feed/www.theregister.com/2025/08/04/think_tank_military_cyber_force/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/08/04/think_tank_military_cyber_force/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS7418<br>Location: Santiago, CL<br>Added: 2025-08-13T01:53</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS9123<br>Location: Saint Petersburg, RU<br>Added: 2025-08-13T01:52</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>BlackCat is a PowerShell module tailored for analyzing Microsoft Azure configurations. It detects potential security vulnerabilities while adhering to best practices. A vital tool for Azure security audits. <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/azurekid/blackcat" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/azurekid/blackcat</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Shodan Safari<p>ASN: AS12876<br>Location: Paris, FR<br>Added: 2025-08-13T01:48</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Harry Sintonen<p>"HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack through HTTP/2 control frames</p><p>MadeYouReset exploits a mismatch caused by stream resets between HTTP/2 specifications and the internal architectures of many real-world web servers. This results in resource exhaustion, and a threat actor can leverage this vulnerability to perform a distributed denial of service attack (DDoS)."</p><p><a href="https://kb.cert.org/vuls/id/767506" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">kb.cert.org/vuls/id/767506</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CVE_2025_8671" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE_2025_8671</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Patrick Townsend<p>US Health and Human Services centralized medical database – Uh oh<br>&nbsp;<br>This week the Health and Human Services (HHS) agency and the Centers for Medicare and Medicaid Services (CMS) are announcing an initiative to create a centralized database of individual’s health information. The stated rationale for this effort is to improve access to innovative health solutions and improve user access and security. A part of this initiative will include updates to the HIPAA regulations. The effort will be led by Robert F. Kennedy Jr. and Dr. Mehmet Oz (Really). There is a pretty aggressive schedule to have the initial work completed by early 2026. The announcement is here:<br>&nbsp;<br><a href="https://www.cms.gov/newsroom/press-releases/white-house-tech-leaders-commit-create-patient-centric-healthcare-ecosystem" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cms.gov/newsroom/press-release</span><span class="invisible">s/white-house-tech-leaders-commit-create-patient-centric-healthcare-ecosystem</span></a><br>&nbsp;<br>My initial thoughts:<br>&nbsp;<br>HIPAA already guarantees users ability access to their health data and regularly penalizes health organizations who do not comply. This seems to be a made-up problem.<br>&nbsp;<br>Privacy of health information is also enforced by current HIPAA regulations. Organizations who violate patient privacy are already penalized under the regulations.<br>&nbsp;<br>The aggressive timeframe for the creation of a centralized database is unrealistic. Further, staff reductions at HHS will make this a riskier endeavor.<br>&nbsp;<br>The dangers of implementing a central database are large. It becomes a target for well-funded state and criminal hackers. It can be easily abused by a punitive state regime (see IRS data being used against immigrants). It can open the door to organizations selling quack treatments and abusing susceptible patients. Nothing in this press release points to better health care support for those who need it. Further, it appears that the lead technology organizations are among those that most abuse personal privacy for profit. None of this is encouraging.<br>&nbsp;<br>I don’t see anything good coming from this, and the potential for abuse is enormous. If you are at-risk individual be sure to download copies of your medical records, and have a discussion with your health providers about your concerns. If you are an IT security specialist or developer in the health sector, be sure you know what options you have in regards to sharing patient information, and be sure that your management team understands the risks.<br>&nbsp;<br><a href="https://infosec.exchange/tags/HIPAA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HIPAA</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/HHS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HHS</span></a> <a href="https://infosec.exchange/tags/CMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CMS</span></a> <a href="https://infosec.exchange/tags/OCR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OCR</span></a></p>
Jonathan Kamens 86 47<p>Here we see that Vanguard is a member of the cursed club of websites that block access through VPNs and then lie about why they're blocking access.<br>I was not "logging in using a script," and when I turned off my VPN I was able to log in just fine, after several logins in a row failed with the VPN active.<br>Assholes.<br><a href="https://federate.social/tags/Vanguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vanguard</span></a> <a href="https://federate.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://federate.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a></p>
Shodan Safari<p>ASN: AS31034<br>Location: Arezzo, IT<br>Added: 2025-08-13T02:10</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Perplexity AI accused of scraping content against websites’ will with unlisted IP ranges <a href="https://go.theregister.com/feed/www.theregister.com/2025/08/04/perplexity_ai_crawlers_accused_data_raids/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/08/04/perplexity_ai_crawlers_accused_data_raids/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS4694<br>Location: Tokyo, JP<br>Added: 2025-08-13T01:48</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Daniel Schildt<p>"Some companies that hid their privacy instructions from search engines included a small link at the bottom of their homepage. Accessing it often required scrolling multiple screens, dismissing pop-ups for cookie permissions and newsletter sign-ups and then finding a link that was a fraction the size of other text on the page."<br><a href="https://themarkup.org/privacy/2025/08/12/we-caught-companies-making-it-harder-to-delete-your-data" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">themarkup.org/privacy/2025/08/</span><span class="invisible">12/we-caught-companies-making-it-harder-to-delete-your-data</span></a></p><p><a href="https://mementomori.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mementomori.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mementomori.social/tags/California" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>California</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>DEF CON faces backlash over deepening ties with U.S. military, defense contractors, and planned expansions into Bahrain and Singapore, sparking protests from hacktivists and renewed debate over its counterculture image. </p><p><a href="https://jackpoulson.substack.com/p/when-counterculture-and-empire-merge" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jackpoulson.substack.com/p/whe</span><span class="invisible">n-counterculture-and-empire-merge</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
BeyondMachines :verified:<p>Fortinet authentication bypass flaw enables device takeover</p><p>Fortinet patched an authentication bypass vulnerability (CVE-2024-26009) in the FortiGate-to-FortiManager protocol that allows attackers to gain administrative access by crafting malicious requests using a known FortiManager serial number, typically obtained through insider threats or social engineering. The flaw affects multiple Fortinet enterprise security products including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager.</p><p>**If you are using FortiManager to manage Fortinet devices, make sure they are isolated from the internet and accessible only from trustef network. Communicate this flaw and the risk of phishing attempts to all admins. Finally, plan a patch process, which may be complex.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/fortinet-authentication-bypass-flaw-enables-device-takeover-h-8-k-d-s/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/fortinet-authentication-bypass-flaw-enables-device-takeover-h-8-k-d-s/gD2P6Ple2L</span></a></p>
Shodan Safari<p>ASN: AS141159<br>Location: Tseung Kwan O, HK<br>Added: 2025-08-13T01:48</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>