snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

363
aktive brukere

#infosecurity

ett innlegg1 deltaker0 innlegg i dag
CoffeeCybersecurity, risk management, long post, brainstorming
CybersecKyle<p>New “LameHug” Malware Deploys AI-Generated Commands <a href="https://www.infosecurity-magazine.com/news/new-lamehug-malware-deploys/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">infosecurity-magazine.com/news</span><span class="invisible">/new-lamehug-malware-deploys/</span></a></p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p>
formuchdeliberation<p>Unit 42, the research team at Palo Alto Networks, has identified a new malicious campaign targeting many financial organizations across Africa... <a href="https://mastodon.world/tags/unit42" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unit42</span></a> <a href="https://mastodon.world/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.world/tags/paloaltonetworks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>paloaltonetworks</span></a> <a href="https://mastodon.world/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.world/tags/africabusiness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>africabusiness</span></a> <a href="https://mastodon.world/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.world/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://mastodon.world/tags/finance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>finance</span></a> <a href="https://mastodon.world/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://mastodon.world/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a> </p><p><a href="https://www.infosecurity-magazine.com/news/hackers-financial-businesses-africa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">infosecurity-magazine.com/news</span><span class="invisible">/hackers-financial-businesses-africa/</span></a></p>
CybersecKyle<p>This is a name I haven’t heard in a minute. </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/winrar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>winrar</span></a> <a href="https://mastodon.social/@PCMag/114745955653051923" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@PCMag/1147459</span><span class="invisible">55653051923</span></a></p>
CybersecKyle<p>God, please don't use public Wi-Fi. Use of VPN if you have to though!</p><p>Why Public Wi-Fi at Tourist Hotspots is a Goldmine for Hackers&nbsp; <a href="https://www.mcafee.com/blogs/internet-security/why-public-wi-fi-at-tourist-hotspots-is-a-goldmine-for-hackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mcafee.com/blogs/internet-secu</span><span class="invisible">rity/why-public-wi-fi-at-tourist-hotspots-is-a-goldmine-for-hackers/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecurity</span></a></p>
Dissent Doe :cupofcoffee:<p>NEW by me:</p><p>Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”</p><p>Defense counsel for Hankins &amp; Sohn claims that the attack they experienced in February 2023 was "unforeseeable." Was it really?</p><p><a href="https://databreaches.net/2025/06/14/plastic-surgeons-often-store-nude-photos-of-patients-with-their-identity-information-when-would-we-call-that-negligent/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">databreaches.net/2025/06/14/pl</span><span class="invisible">astic-surgeons-often-store-nude-photos-of-patients-with-their-identity-information-when-would-we-call-that-negligent/</span></a></p><p><a href="https://infosec.exchange/tags/HealthSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HealthSec</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/extortion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>extortion</span></a> <a href="https://infosec.exchange/tags/HIPAA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HIPAA</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a></p>
Who Let The Dogs Out 🐾<p>ИБ-исследователь Michal Wozniak: «Telegram неотличим от приманки спецслужб» / Хабр</p><p><a href="https://habr.com/ru/articles/917154/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/917154/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.ml/tags/telegram" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telegram</span></a> <a href="https://mastodon.ml/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p>&gt; Автор оригинала: Michal Wozniak</p><p>Многие люди, занимающиеся информационной безопасностью, включая меня, [давно считают Telegram подозрительным](<a href="https://gizmodo.com/why-you-should-stop-using-telegram-right-now-1782557415" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gizmodo.com/why-you-should-sto</span><span class="invisible">p-using-telegram-right-now-1782557415</span></a>) и [ненадёжным] (<a href="https://cpj.org/2016/05/why-telegrams-security-flaws-may-put-irans-journal/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cpj.org/2016/05/why-telegrams-</span><span class="invisible">security-flaws-may-put-irans-journal/</span></a>). </p><p>Теперь, основываясь на выводах, опубликованных расследовательским журналистским изданием IStories*, и моём собственном анализе перехватов пакетов из Telegram для Android и протокола Telegram, описанного ниже, я считаю Telegram неотличимым от ханипота для слежки.</p><p>Telegram генерирует долгосрочный идентификатор, называемый `auth_key_id`, на каждом клиентском устройстве. Этот идентификатор не меняется в зависимости от того, откуда подключается клиент.</p>
Dissent Doe :cupofcoffee:<p>York County, Pennsylvania incident: </p><p>An employee of a vendor that had been hired to develop software for York County Civil Courts was provided “with certain York County Civil Courts data to use for software development and testing purposes. The employee subsequently left the vendor’s employment without returning this data,” according to the county's press release.</p><p>So it seems they gave the vendor's employee REAL data to use for development and testing -- with "contact information, Social Security numbers, driver’s license or state ID card numbers, financial and medical information"</p><p>And of course, there's no evidence of misuse, but they have referred the matter to law enforcement.....</p><p>h/t, <a href="https://www.pennlive.com/news/2025/05/central-pa-county-alerts-residents-of-potential-data-leak.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pennlive.com/news/2025/05/cent</span><span class="invisible">ral-pa-county-alerts-residents-of-potential-data-leak.html</span></a></p><p><a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/govsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>govsec</span></a> <a href="https://infosec.exchange/tags/insiderthreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>insiderthreat</span></a></p>
Marco Ciappelli🎙️✨:verified: :donor:<p>Great briefing, Infinidat! 🩷 <br>Thank you for being part of ITSPmagazine's <a href="https://infosec.exchange/tags/RSAC2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSAC2025</span></a> coverage!</p><p>🎙️ Another powerful On Location conversation from <a href="https://infosec.exchange/tags/RSAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSAC</span></a> 2025 — this time, it’s all about building <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/resilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>resilience</span></a> when every second counts!</p><p>🚀 New Briefing from RSAC 2025: When Every Second Counts — Building Cyber Resilience Through Smarter Data Protection</p><p>At RSAC Conference 2025, Sean Martin, CISSP caught up with Eric Herzog, Chief Marketing Officer at Infinidat, to talk about how a smarter approach to <a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> can be a game-changer for <a href="https://infosec.exchange/tags/cyberresilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberresilience</span></a>.</p><p>🔐 When attacks happen, the difference between recovery and disaster can come down to seconds.<br>Find out how Infinidat is helping organizations design storage and backup strategies built for today’s cybersecurity realities.</p><p>🎙️ Watch, listen, or read the full conversation here:<br>👉 <a href="https://www.itspmagazine.com/their-stories/when-every-second-counts-building-cyber-resilience-through-a-smarter-approach-to-data-protection-a-brand-story-with-eric-herzog-from-infinidat-an-on-location-rsac-conference-2025-brand-story" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/their-stories</span><span class="invisible">/when-every-second-counts-building-cyber-resilience-through-a-smarter-approach-to-data-protection-a-brand-story-with-eric-herzog-from-infinidat-an-on-location-rsac-conference-2025-brand-story</span></a></p><p>📌 Learn more about Infinidat’s work:<br>👉 <a href="https://www.itspmagazine.com/directory/infinidat" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/directory/inf</span><span class="invisible">inidat</span></a></p><p>🛰️ See all our RSAC 2025 coverage:<br>👉 <a href="https://www.itspmagazine.com/rsac25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/rsac25</span><span class="invisible"></span></a></p><p>🌟 Discover more Brand Stories and Briefings from innovative companies:<br>👉 <a href="https://www.itspmagazine.com/brand-story" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/brand-story</span><span class="invisible"></span></a></p><p>🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.<br>Stay tuned for more Brand Stories, Briefings, and candid conversations from RSAC 2025!</p><p>🎤 Looking ahead:<br>If your company would like to share your story with our audiences On Location, we’re gearing up for Infosecurity Europe in June and Black Hat USA in August!<br>⚡ RSAC 2025 sold out fast — we expect the same for these next events.<br>🎯 Reserve your full sponsorship or briefing now: <a href="https://www.itspmagazine.com/purchase-programs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itspmagazine.com/purchase-prog</span><span class="invisible">rams</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://infosec.exchange/tags/society" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>society</span></a> <a href="https://infosec.exchange/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://infosec.exchange/tags/cyberresilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberresilience</span></a> <a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.exchange/tags/backuprecovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backuprecovery</span></a> <a href="https://infosec.exchange/tags/infinidat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infinidat</span></a></p>
Redhotcyber<p>Sicurezza è Lavoro: dal cantiere al cloud, dobbiamo proteggere chi costruisce l’Italia!</p><p>📌 Link all'articolo : <a href="https://www.redhotcyber.com/post/sicurezza-e-lavoro-dal-cantiere-al-cloud-dobbiamo-proteggere-chi-costruisce-litalia/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/sicurezza</span><span class="invisible">-e-lavoro-dal-cantiere-al-cloud-dobbiamo-proteggere-chi-costruisce-litalia/</span></a></p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.bida.im/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreatintelligence</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p>
Redhotcyber<p>Un Misterioso “fenomeno atmosferico” è la causa del blackout in Spagna e Portogallo</p><p>📌 Link all'articolo : <a href="https://www.redhotcyber.com/post/un-misterioso-e-raro-fenomeno-atmosferico-e-la-causa-del-blackout-in-spagna-e-portogallo/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/un-mister</span><span class="invisible">ioso-e-raro-fenomeno-atmosferico-e-la-causa-del-blackout-in-spagna-e-portogallo/</span></a></p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.bida.im/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreatintelligence</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p>
Dissent Doe :cupofcoffee:<p>I very seldom see data breach notifications from North Dakota, but it's interesting to note that the state has now enacted HB 1127, overhauling its regulatory framework for financial institutions and nonbank financial service providers. </p><p>Read about the law's data protection and breach notification requirements: <a href="https://natlawreview.com/article/north-dakota-expands-data-security-requirements-and-issues-new-licensing" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">natlawreview.com/article/north</span><span class="invisible">-dakota-expands-data-security-requirements-and-issues-new-licensing</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/legislation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>legislation</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/notification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>notification</span></a> <a href="https://infosec.exchange/tags/FinSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSec</span></a> <a href="https://infosec.exchange/tags/NorthDakota" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthDakota</span></a></p>
Dissent Doe :cupofcoffee:<p>Former Disney employee who hacked Disney World restaurant menus in revenge sentenced to 3 years in federal prison:</p><p><a href="https://www.justice.gov/usao-mdfl/pr/winter-garden-man-sentenced-3-years-federal-prison-conducting-series-cyber-intrusions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">justice.gov/usao-mdfl/pr/winte</span><span class="invisible">r-garden-man-sentenced-3-years-federal-prison-conducting-series-cyber-intrusions</span></a></p><p>He got off pretty lightly considering he tampered with the allergy information on food items that could have caused life-threatning allergic reactions in some people. </p><p><a href="https://infosec.exchange/tags/insiderthreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>insiderthreat</span></a> <a href="https://infosec.exchange/tags/revenge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>revenge</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p>
happygeek :unverified: + :verified: = $0<p>It took me a while to catch on to this one, sorry, but it's a great report and worth reading. By me @Forbes: a million Windows devices infected by infostealer malware. <a href="https://infosec.exchange/tags/kudos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kudos</span></a> @MsftSecIntel </p><p><a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> </p><p><a href="https://www.forbes.com/sites/daveywinder/2025/04/01/infostealer-infects-1-million-windows-devices-via-discord-dropbox-github/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/daveywinder/2</span><span class="invisible">025/04/01/infostealer-infects-1-million-windows-devices-via-discord-dropbox-github/</span></a></p>
happygeek :unverified: + :verified: = $0<p>It's my last day before more surgery, so I'm getting some work done. By me @Forbes: Chinese smartphone farm attack. The farm, not the smartphones, although...</p><p><a href="https://infosec.exchange/tags/kudos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kudos</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@prodaft" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>prodaft</span></a></span></p><p><a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a> </p><p><a href="https://www.forbes.com/sites/daveywinder/2025/04/01/warning-as-smartphone-farm-used-in-100000-android-iphone-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">forbes.com/sites/daveywinder/2</span><span class="invisible">025/04/01/warning-as-smartphone-farm-used-in-100000-android-iphone-attacks/</span></a></p>