framapiaf.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Un service Mastodon fourni par l'association d’éducation populaire Framasoft.

Administré par :

Statistiques du serveur :

1,4K
comptes actifs

#cloudsecurity

4 messages4 participants0 message aujourd’hui

New Open-Source Tool Spotlight 🚨🚨🚨

Mimikatz is a well-known open-source tool for extracting credentials from Windows systems. It can retrieve plaintext passwords, hash credentials, and even Kerberos tickets from memory. Used by both researchers and attackers, it highlights the importance of secure credential management in Active Directory environments. #CyberSecurity #WindowsSecurity

🔗 Project link on #GitHub 👉 github.com/gentilkiwi/mimikatz

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

🎙️ BIG NEWS: I'm launching Entra.Chat - the podcast identity pros have been waiting for!

After years in the identity trenches, I've seen a lot - the midnight calls, the authentication puzzles, and those "how is this even possible?" moments.

That's why I created EntraChat - to share the REAL stories behind Microsoft Entra deployments that you won't find in documentation.

My first episode drops TODAY with identity wizard Ben Wolfe, who reveals how his team migrated 700 apps and 30,000 users from Okta to Microsoft Entra in just 90 days (while implementing Windows Hello for Business simultaneously!)

I've already recorded amazing conversations with identity leaders who've solved problems you're probably facing right now. Their candid insights and battle-tested solutions might just save your next deployment!

Upcoming episodes include conversations with
❤️ Kuba Gretzky - Creator of EvilGinx
❤️ Martin Sandren - Product leader at Ikea
❤️ Dhanyah Krishnamoorthy - Product Manager, Microsoft Entra for Connect Sync and Cloud Sync
❤️ Samantha 🦚 Kloos-Kilkens -
❤️ Nathan McNulty - Fountain of knowledge on all things Microsoft Security

Who's ready to level up their identity knowledge?

Drop a 💙 if you're as excited about this as I am!

Subscribe with your favourite podcast player:
🎧 Apple Podcast - podcasts.apple.com/us/podcast/

🎧 Spotify - open.spotify.com/show/2lJSWBTm

📺 YouTube - youtube.com/@merillx/podcasts

🎧 Pocketcast - pca.st/10oii6uv

🎧 Overcast - overcast.fm/itunes1801200012

🎧 Other podcast apps (rss) - api.substack.com/feed/podcast/

Episode 1: entra.news/p/from-okta-to-entr

New Open-Source Tool Spotlight 🚨🚨🚨

Bettercap is a powerful, modular tool for network attacks and monitoring. It supports ARP spoofing, DNS spoofing, packet sniffing, and more. Written in Go, it's flexible and efficient for intercepting and manipulating network traffic on various protocols. #cybersecurity #networking

🔗 Project link on #github 👉 github.com/bettercap/bettercap

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

How can organizations trust their AI when the data it learns from might be compromised? 🧠🔐

Data poisoning is a growing concern in cybersecurity, especially with the expanding reliance on machine learning models. At its core, data poisoning involves malicious actors tampering with training datasets to undermine an AI system's performance or behavior. This manipulation could lead to subtle biases, complete dysfunction, or even harmful outcomes in critical applications like healthcare diagnostics, fraud detection, or autonomous systems.

For example, in a supervised learning model for financial fraud detection, attackers might inject fraudulent transaction data labeled as legitimate during the training process. As a result, the model becomes less effective at identifying real fraud cases. Detecting these poisoned inputs is immensely challenging, particularly in large-scale datasets where irregularities might appear statistically insignificant.

The threat becomes more pressing as organizations increasingly rely on third-party datasets or shared data repositories. Without stringent validation mechanisms, poisoned data can infiltrate and compromise AI at scale. Worse, attacks can be tailored—targeting specific outputs or patterns—allowing attackers to exploit vulnerabilities that are very difficult to predict or reverse.

Mitigating this risk requires advanced strategies. Techniques like data provenance checks, anomaly detection during data preprocessing, and model robustness testing can help. Also, employing federated learning (training models locally without centralizing data) limits exposure to malicious actors. But these defenses are resource-intensive and introduce their own complexities.

Ultimately, ensuring AI systems remain trustworthy hinges on securing the integrity of the data pipeline—not just reacting after the damage is done. As the adoption of AI accelerates, so does the urgency to prioritize its foundational safety.

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

Abandoned S3 Buckets are a goldmine for hackers!

Last week, we shared new research revealing the alarming risks of abandoned S3 buckets. Now, cybersecurity experts @sherridavidoff and @MDurrin share more details on this new threat and provide advice on how to reduce your risk from this attack tactic that can expose you to supply chain compromises and remote code execution attacks.

Read our latest blog to learn how to protect your organization: lmgsecurity.com/abandoned-s3-b

abandoned s3 buckets
LMG SecurityAbandoned S3 Buckets: A Goldmine for Hackers | LMG SecurityNew research revealed a chilling reality: abandoned S3 buckets are a new attack vector. Learn more about these attacks & how to reduce your organization's risk.

Have you considered how "forgotten" data can still persist in AI systems? 🧠💻

Once shared, even for a moment, data can linger within generative AI chatbots like ChatGPT or Bard, potentially resurfacing in unexpected ways. Here's why: when you input information into these models, even if the original source is later deleted or access is restricted, the model may have already incorporated elements of that data during its training or refinement process.

This is particularly concerning because generative AI lacks traditional memory but learns by analyzing patterns in vast datasets. If sensitive details inadvertently become part of this learning, they can't easily be "unlearned." For example, if confidential company strategies are fed into a chatbot to draft a report, fragments of that data could indirectly reappear in future outputs.

Most providers try to manage this risk with clear limits on how inputs are used and improved privacy mechanisms. However, the challenge remains substantial. The lack of transparency over training datasets, combined with how models store relationships between words and ideas, makes control over such "forgotten" data complex.

Organizations and individuals must exercise caution by steering clear of sharing sensitive or private information with AI tools unless there's explicit assurance about privacy and data usage policies.

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

🔓 No More End-to-End Encryption for iCloud in the UK!

#Apple halts Advanced Data Protection under government pressure. Your iCloud files? No longer fully encrypted.

🔐 Take back control – encrypt your files before uploading! Cryptomator keeps your data private, no matter what Big Tech decides.

➡️ Read more: cryptomator.org/blog/2025/02/2

A Team of Female #Founders Is Launching #CloudSecurity Tech That Could Overhaul #AI Protection

Cloud “container” defenses have inconsistencies that can give attackers too much access. A new company, #Edera , is taking on that challenge and the problem of the male-dominated #startup world.
#security #container #privacy

wired.com/story/edera-cloud-te

WIRED · A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI ProtectionPar Lily Hay Newman

How secure is your information when you apply for a new job? 🛡️💻

A Texas-based recruitment software company has disclosed that hackers managed to access sensitive data belonging to job applicants. Among the stolen information were Social Security Numbers (SSNs), financial details, and potentially other personal data provided during job applications. This breach raises serious concerns about the security of applicant tracking systems, which are widely used by companies to process hiring.

These systems often collect a significant amount of personal information, from resumes to tax documents, making them a prime target for cybercriminals. The breach highlights vulnerabilities in how sensitive data is stored and transmitted within such platforms. While details about the specific method of attack weren't disclosed, this serves as a reminder that encryption, regular audits, and robust cybersecurity protocols are essential when handling personal data.

For individuals, it’s critical to stay vigilant after such breaches. Monitoring credit reports, placing fraud alerts, and using identity theft protection services can reduce the potential harm caused by stolen financial or identification details. Companies, meanwhile, must reassess their cybersecurity strategies, ensuring compliance not just with basic security standards but with advanced, proactive measures to deter breaches like this in the future.

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

How does a single nation take on some of the largest crypto networks in the world? 🤔💻

According to blockchain tracking firms and cybersecurity researchers, North Korea is linked to one of the most significant crypto hacks of recent times. The attack, believed to involve sophisticated tactics, siphoned off millions in digital assets. This isn’t the country's first foray into crypto theft; North Korean hacking groups, most notably Lazarus Group, have been implicated in multiple similar exploits.

Blockchain activity linked to the breach reveals well-coordinated operations leveraging vulnerabilities in decentralized finance (DeFi) protocols and cryptocurrency exchanges. These groups often use techniques like phishing, social engineering, or exploiting weak smart contract security to gain access to funds. Once stolen, the assets are laundered through complex methods such as chain-hopping — moving funds across multiple blockchains — or using mixer services to obscure transaction history.

The United Nations has long accused North Korea of using stolen cryptocurrency to fund its missile programs, bypassing global sanctions. With estimates suggesting billions have been lost to these operations over the years, this latest hack adds to a growing pattern that highlights weaknesses in crypto security.

For crypto users and developers, this serves as another wake-up call about the critical need for robust security measures, especially as attackers continue to evolve their methods.

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️