mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.4K
active users

#penetrationtesting

5 posts5 participants0 posts today

🤖 Is autonomous pen testing the future of offensive security or just a flashy concept?

Join us on the Shared Security Podcast as we discuss XBOW's game-changing technology with co-host Kevin Johnson and explore what it means for cybersecurity professionals.

Watch on YouTube:
youtu.be/VeOMYBSk3Dk

Listen and subscribe to the podcast!
sharedsecurity.net/subscribe

sharedsecurity.net/2025/07/07/

$500 Bounty: Subdomain Takeover on live.firefox.com via Unclaimed Fastly CNAME How an Unregistered CDN Entry Could’ve Been Weaponized for Malware Campaigns and Cookie-Based Attacks Continue readi...

#tips-and-tricks #technology #bug-bounty #vulnerability #penetration-testing

Origin | Interest | Match
InfoSec Write-ups · $500 Bounty: Subdomain Takeover on live.firefox.com via Unclaimed Fastly CNAMEBy Monika sharma
$500 Bounty: Subdomain Takeover on live.firefox.com via Unclaimed Fastly CNAME How an Unregistered CDN Entry Could’ve Been Weaponized for Malware Campaigns and Cookie-Based Attacks Continue readi...

#tips-and-tricks #technology #bug-bounty #vulnerability #penetration-testing

Origin | Interest | Match
InfoSec Write-ups · $500 Bounty: Subdomain Takeover on live.firefox.com via Unclaimed Fastly CNAMEBy Monika sharma
Penetration Testing of AI: Why and How? Artificial Intelligence (AI) systems have rapidly evolved from research projects to business-critical assets powering fraud detection, recommendation engines...

#infosec #info-sec-writeups #penetration-testing #cybersecurity

Origin | Interest | Match
InfoSec Write-ups · Penetration Testing of AI: Why and How? - InfoSec Write-upsBy Sandeep Saxena

✅ Certified. 🔍 Trusted. 💡 Proactive.

Check Point’s Infinity Platform Service Pen Testing is now CREST-accredited — a global gold standard in ethical hacking!

Why it matters:
🎯 Real-world attack simulations
🧠 Expert-led assessments
🔐 Tested, proven, and now certified by CREST

Because in cyber security, you don’t wait for threats — you hunt them first.
👉 blog.checkpoint.com/infinity-g

Check Point Blog · Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-AccreditationBy lizwu@checkpoint.com

New mass scanning activity may be the first step in another MOVEit attack.

Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.

Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.

If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.

Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed

Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.

Read the article for details: cuinfosecurity.com/scans-probi