mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.2K
active users

#securityresearch

0 posts0 participants0 posts today
Gesellschaft für Informatik eV<p>Nochmal <a href="https://mas.to/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersicherheit</span></a>: Die Forschung nutzt hier oft dieselben Methoden wie Angreifende – und bewegt sich rechtlich in einer Grauzone.<br> <br><span class="h-card" translate="no"><a href="https://wisskomm.social/@ATHENECenter" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ATHENECenter</span></a></span> verhandelt solche Fälle in Simulationsgerichten, um klare Leitplanken für sichere Forschung zu setzen.<br> <br>👩‍⚖️ Erster Fall: „Angebot-zur-Übernahme-von-Cyberangriffen-im-Auftrag.pdf“ – inklusive Tausende gestohlene Zugangsdaten. Was tun damit?</p><p>Mehr auf unserem Blog: <a href="https://gi.de/themen/beitrag/simulationsgericht-fuer-cybersicherheitsforschung" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gi.de/themen/beitrag/simulatio</span><span class="invisible">nsgericht-fuer-cybersicherheitsforschung</span></a><br> <br><a href="https://mas.to/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://mas.to/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://mas.to/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://mas.to/tags/Informatik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Informatik</span></a> <a href="https://mas.to/tags/Darknet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Darknet</span></a></p>
HackerNews VN bot<p>Một lỗ hổng bảo mật nghiêm trọng đã được phát hiện trong một ứng dụng hẹn hò. Theo chia sẻ của nhà nghiên cứu, việc tìm ra lỗ hổng này chỉ là kết quả của một "cú nhấp chuột nhầm", cho thấy tầm quan trọng của việc kiểm tra bảo mật kỹ lưỡng.</p><p><a href="https://mastodon.maobui.com/tags/B%E1%BA%A3oM%E1%BA%ADt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BảoMật</span></a> <a href="https://mastodon.maobui.com/tags/L%E1%BB%97H%E1%BB%95ngB%E1%BA%A3oM%E1%BA%ADt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LỗHổngBảoMật</span></a> <a href="https://mastodon.maobui.com/tags/%E1%BB%A8ngD%E1%BB%A5ngH%E1%BA%B9nH%C3%B2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ỨngDụngHẹnHò</span></a> <a href="https://mastodon.maobui.com/tags/AnTo%C3%A0nTh%C3%B4ngTin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnToànThôngTin</span></a> <a href="https://mastodon.maobui.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.maobui.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.maobui.com/tags/DatingApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DatingApp</span></a> <a href="https://mastodon.maobui.com/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a></p><p><a href="https://www.hame.page/articles/critical-vulnerability-dating-app" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hame.page/articles/critical-vu</span><span class="invisible">lnerability-dating-app</span></a></p>
Lenin alevski 🕵️💻<p>🚀 I launched my latest security research project — RBAC Atlas — to deepen my understanding of Kubernetes and evaluate the security posture of the open source ecosystem.</p><p>🧭 RBAC Atlas is a searchable, visual index of risky RBAC policies across Kubernetes-based OSS projects. Through this research, I analyzed:</p><p>1. 100+ popular open source projects<br>2. Hundreds of Roles, RoleBindings, and their granted permissions<br>3. Risk categories like CredentialAccess, SecretExposure, PrivilegeEscalation, and more</p><p>This project was built to help platform teams, security engineers, and OSS maintainers identify and reduce RBAC misconfigurations — one of the most overlooked Kubernetes security risks.</p><p>If this sounds useful, connect with me — or feel free to share it with anyone on your team who might be interested.</p><p><a href="https://infosec.exchange/tags/kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kubernetes</span></a> <a href="https://infosec.exchange/tags/rbac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rbac</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/cloudnative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudnative</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/rbacatlas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rbacatlas</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devsecops</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZTrustwave SpiderLabs’ 2025 Risk Radar Report: Technology Sector Explore key insights from Trustwave SpiderLabs' latest report on securing tech firms against evolving cyber threats. Discover h...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Vulnerabilities" target="_blank">#Vulnerabilities</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Data" target="_blank">#Data</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Breach" target="_blank">#Breach</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Security&nbsp;Research" target="_blank">#Security&nbsp;Research</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Threat" target="_blank">#Threat</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Intelligence" target="_blank">#Intelligence</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Artificial" target="_blank">#Artificial</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Intelligence" target="_blank">#Intelligence</a><br><br><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trustwave-spiderlabs-2025-risk-radar-report-technology-sector/" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=PQAuAvAwRIrLuzZo4fiKx81rljs&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Alexandre Borges<p>Emulating an iPhone in QEMU:</p><p>Part 01: <a href="https://eshard.com/posts/emulating-ios-14-with-qemu" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eshard.com/posts/emulating-ios</span><span class="invisible">-14-with-qemu</span></a><br>Part 02: <a href="https://eshard.com/posts/emulating-ios-14-with-qemu-part2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eshard.com/posts/emulating-ios</span><span class="invisible">-14-with-qemu-part2</span></a></p><p><a href="https://infosec.exchange/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://infosec.exchange/tags/iphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iphone</span></a> <a href="https://infosec.exchange/tags/emulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emulation</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a></p>
Max Renke<p>Day 1 of posting to social media until I get an offensive security research job</p><p>First, I’m going to start with what I know – Windows. I need to recreate what I had access to at Microsoft, so that starts by setting up a dev environment and finding a copy of Windows System Internals, perhaps the greatest resource for learning Windows out there. My expertise is in Windows and virtualization, so I’m going to make sure I master those areas.</p><p>Next, I don’t think I want to grind coding exercises, but I do need to shake the rust off my coding skills. I think I’m going to start with some HackTheBox challenges and find some CTFs to participate in.<br> <br>Finally, my long overdue goal: learn Rust. I’m not sure if this will help immediately, as I could choose to improve my knowledge of Python. But Rust was getting more and more popular in the areas of Windows I was tasked with protecting, so I need to learn what all the fuss is about with regards to memory safety.<br> <br>If anyone is on a similar journey, let’s hold each other accountable in the comments! I will be sure to document any write-ups at blog.maxrenke.com (work in progress).</p><p><a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffensiveSecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsInternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsInternals</span></a> <a href="https://infosec.exchange/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackTheBox</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/PythonProgramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PythonProgramming</span></a> <a href="https://infosec.exchange/tags/DevEnvironment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevEnvironment</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberCareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCareer</span></a> <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/CyberCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCommunity</span></a> <a href="https://infosec.exchange/tags/JobSearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JobSearch</span></a> <a href="https://infosec.exchange/tags/TechJourney" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechJourney</span></a> <a href="https://infosec.exchange/tags/SecurityEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityEngineering</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/LearningEveryDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LearningEveryDay</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZHospitality Under Attack: New Trustwave Report Highlights Cybersecurity Challenges in 2025 As the...<br><br><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hospitality-under-attack-new-trustwave-report-highlights-cybersecurity-challenges-in-2025/" rel="nofollow noopener" target="_blank">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hospitality-under-attack-new-trustwave-report-highlights-cybersecurity-challenges-in-2025/</a><br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/News" target="_blank">#News</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Reports" target="_blank">#Reports</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Security&nbsp;Research" target="_blank">#Security&nbsp;Research</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Threat" target="_blank">#Threat</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Intelligence" target="_blank">#Intelligence</a><br><br><a href="https://awakari.com/pub-msg.html?id=7QOJuPUGqAB3orszSvr9y8NiyhM&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Result Details</a>
Hacker News<p>Oracle VM VirtualBox – VM Escape via VGA Device</p><p><a href="https://github.com/google/security-research/security/advisories/GHSA-qx2m-rcpc-v43v" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/google/security-res</span><span class="invisible">earch/security/advisories/GHSA-qx2m-rcpc-v43v</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/OracleVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OracleVM</span></a> <a href="https://mastodon.social/tags/VirtualBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirtualBox</span></a> <a href="https://mastodon.social/tags/VMescape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMescape</span></a> <a href="https://mastodon.social/tags/VGADevice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VGADevice</span></a> <a href="https://mastodon.social/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a></p>
Hacker News<p>Multiple Security Issues in GNU Screen</p><p><a href="https://www.openwall.com/lists/oss-security/2025/05/12/1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openwall.com/lists/oss-securit</span><span class="invisible">y/2025/05/12/1</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/MultipleSecurityIssues" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MultipleSecurityIssues</span></a> <a href="https://mastodon.social/tags/GNUScreen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNUScreen</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZLights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities Let’s...<br><br><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/lights-out-and-stalled-factories-using-matrix-to-learn-about-modbus-vulnerabilities/" rel="nofollow noopener" target="_blank">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/lights-out-and-stalled-factories-using-matrix-to-learn-about-modbus-vulnerabilities/</a><br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Emerging" target="_blank">#Emerging</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Threats" target="_blank">#Threats</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Vulnerabilities" target="_blank">#Vulnerabilities</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/Security&nbsp;Research" target="_blank">#Security&nbsp;Research</a><br><br><a href="https://awakari.com/pub-msg.html?id=09GK1qLaqAIP6lQMXXxyMqCmGAK&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Result Details</a>
Tailscale<p>Security isn’t just a priority — it’s a passion. 🛡️</p><p>This Sunday at @BSidesSF, Tailscale’s <span class="h-card" translate="no"><a href="https://infosec.exchange/@patrickod" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>patrickod</span></a></span> will share how he found a long-standing CSRF bug in the gorilla/csrf Go lib.</p><p>Don’t miss it 🔍 (theatre 14)<br>📅 <a href="https://bsidessf2025.sched.com/event/1x8UA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsidessf2025.sched.com/event/1</span><span class="invisible">x8UA</span></a><br>📺 <a href="https://bsidessf.org/streams" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsidessf.org/streams</span><span class="invisible"></span></a></p><p><a href="https://hachyderm.io/tags/BSidesSF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesSF</span></a> <a href="https://hachyderm.io/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://hachyderm.io/tags/golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>golang</span></a> <a href="https://hachyderm.io/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a> <a href="https://hachyderm.io/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a></p>
Winbuzzer<p>New Tool Exposes How Ads in Apps Use Network Data Tracking to Trace Your Location</p><p><a href="https://mastodon.social/tags/MobilePrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobilePrivacy</span></a> <a href="https://mastodon.social/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://mastodon.social/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a> <a href="https://mastodon.social/tags/AdTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdTech</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/LocationTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocationTracking</span></a> <a href="https://mastodon.social/tags/DataBroker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBroker</span></a> <a href="https://mastodon.social/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> <a href="https://mastodon.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://mastodon.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://mastodon.social/tags/PrivacyTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacyTools</span></a> <a href="https://mastodon.social/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a></p><p><a href="https://winbuzzer.com/2025/04/20/new-tool-exposes-how-ads-in-apps-use-network-data-tracking-to-trace-your-location-xcxwbn/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/04/20/new-t</span><span class="invisible">ool-exposes-how-ads-in-apps-use-network-data-tracking-to-trace-your-location-xcxwbn/</span></a></p>
Hacker News<p>European Union Vulnerability Database (EUVD)</p><p><a href="https://euvd.enisa.europa.eu/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">euvd.enisa.europa.eu/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/EuropeanUnion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EuropeanUnion</span></a> <a href="https://mastodon.social/tags/VulnerabilityDatabase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityDatabase</span></a> <a href="https://mastodon.social/tags/EUVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUVD</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/ENISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ENISA</span></a> <a href="https://mastodon.social/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a></p>
pelemarse<p>PentestGPT, an AI-driven tool released in 2024, uses GPT-4 to guide penetration testers through hacking tasks, suggesting recon steps, exploitation commands, and analyzing results. </p><p><a href="https://fosstodon.org/tags/pentestgpt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentestgpt</span></a> <a href="https://fosstodon.org/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://fosstodon.org/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtesting</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/gpt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gpt</span></a> <a href="https://fosstodon.org/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://fosstodon.org/tags/chatgpt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatgpt</span></a> <a href="https://fosstodon.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://fosstodon.org/tags/securitytools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitytools</span></a> <a href="https://fosstodon.org/tags/openai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openai</span></a> <a href="https://fosstodon.org/tags/securityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityresearch</span></a> <a href="https://fosstodon.org/tags/hackingassistant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingassistant</span></a><br><a href="https://www.darknet.org.uk/2025/04/pentestgpt-ai-powered-penetration-testing-assistant/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darknet.org.uk/2025/04/pentest</span><span class="invisible">gpt-ai-powered-penetration-testing-assistant/</span></a></p>
Seth G.<p>I'm transitioning to more of a <a href="https://chaos.social/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> role within my company and would really appreciate advice from experienced <a href="https://chaos.social/tags/researchers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>researchers</span></a>, whatever your specialty.</p><p><a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://chaos.social/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://chaos.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://chaos.social/tags/AiResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AiResearch</span></a></p>
Opalsec :verified:<p>Our latest blog post is live, check it out! </p><p>🗞️ <a href="https://opalsec.io/daily-news-update-sunday-march-30-2025-australia-melbourne/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-s</span><span class="invisible">unday-march-30-2025-australia-melbourne/</span></a></p><p>* 👾 Obscure Programming Languages in Malware: Malware authors are getting creative, using less common languages like Rust, Nim, Phix, Lisp and Haskell to evade detection - and it works. <br>* 💔 $8.2 Million Seized in Crypto Romance Baiting: The DOJ just seized millions in USDT from "romance baiting" scams (aka pig butchering), with links to human trafficking in Cambodia and Myanmar. This is a stark reminder of the human element in cybercrime.</p><p>Don't forget, you can subscribe to our newsletter here to get the updates straight to your inbox! </p><p>📨<a href="https://opalsec.io/daily-news-update-sunday-march-30-2025-australia-melbourne/#/portal/signup" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-s</span><span class="invisible">unday-march-30-2025-australia-melbourne/#/portal/signup</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cryptoscams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptoscams</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://infosec.exchange/tags/pigbutchering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pigbutchering</span></a> <a href="https://infosec.exchange/tags/usdt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>usdt</span></a> <a href="https://infosec.exchange/tags/doj" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doj</span></a> <a href="https://infosec.exchange/tags/fbi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fbi</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/zerotrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerotrust</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/reversengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversengineering</span></a></p>
Ben<p>I am looking for good <a href="https://vmst.io/tags/RSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSS</span></a> / <a href="https://vmst.io/tags/Atom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Atom</span></a> feeds about <a href="https://vmst.io/tags/Selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Selfhosting</span></a> <a href="https://vmst.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://vmst.io/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://vmst.io/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://vmst.io/tags/UnplugTrump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnplugTrump</span></a> <a href="https://vmst.io/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://vmst.io/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://vmst.io/tags/EUPol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUPol</span></a> <br><a href="https://vmst.io/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> <a href="https://vmst.io/tags/Fediverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fediverse</span></a></p>
CREST<p>📢We&#39;re delighted to launch our 20th issue of CREST Security Review (CSR), which focuses on counter-terrorism and counter-extremism evaluation 🔎</p><p>The articles reflect the challenges and opportunities of understanding ‘what works’ in this field, and describe recent developments in what is a vibrant field of research and practice. </p><p>Read, download &amp; share for free ⬇️ <a href="https://crestresearch.ac.uk/magazine/evaluation/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">crestresearch.ac.uk/magazine/e</span><span class="invisible">valuation/</span></a> <a href="https://mastodon.world/tags/Evaluation" class="mention hashtag" rel="tag">#<span>Evaluation</span></a> <a href="https://mastodon.world/tags/CVE" class="mention hashtag" rel="tag">#<span>CVE</span></a> <a href="https://mastodon.world/tags/Counterterrorism" class="mention hashtag" rel="tag">#<span>Counterterrorism</span></a> <a href="https://mastodon.world/tags/SecurityResearch" class="mention hashtag" rel="tag">#<span>SecurityResearch</span></a></p>
Darren Meyer :donor:<p>I'm thrilled to announce that I've joined Checkmarx Zero! </p><p>In the new role, I'm getting even deeper into security research, and I'll focus a lot of my time on making our findings even more understandable and practical for a wider audience. </p><p>I look forward to working with this world-class research team. Watch for upcoming papers, blogs, conference presentations, and industry collaborations! </p><p><a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/NewJob" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NewJob</span></a></p>
Pen Test Partners<p>The best ICS testing results don’t come from a single approach. Onsite testing has to be risk-averse, and lab testing can uncover deeper vulnerabilities. The key? A combined approach…<br>&nbsp;<br>OT environments don't stand up to regular IT pen testing. Any pen tester that doesn't fully understand that could easily destroy systems and take out critical infrastructure.<br>&nbsp;<br>By strategically selecting devices for lab testing based on onsite insights, you get the best of both worlds without unnecessary risk or cost.<br>&nbsp;<br>In our latest blog, Head of Hardware Andrew Tierney explains how this method finds hidden threats in ICS networks: <a href="https://www.pentestpartners.com/security-blog/ics-testing-best-results-hint-blend-your-approach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/ics-testing-best-results-hint-blend-your-approach/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/icsmonitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icsmonitoring</span></a> <a href="https://infosec.exchange/tags/industrialsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industrialsecurity</span></a> <a href="https://infosec.exchange/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/operationaltechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operationaltechnology</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/cyberawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberawareness</span></a></p>