101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

517
active users

#cyberhygiene

0 posts0 participants0 posts today
BSI<p>Euer Account wurde gehackt? Im Reel zeigen wir euch die ersten Schritte. </p><p>👉 Wie ihr langfristig eure Sicherheit stärkt und Schäden begrenzt, erfahrt ihr auf unserer Website: <a href="https://www.bsi.bund.de/dok/6700632" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bsi.bund.de/dok/6700632</span><span class="invisible"></span></a> </p><p><a href="https://social.bund.de/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a> <a href="https://social.bund.de/tags/AccountSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AccountSicherheit</span></a> <a href="https://social.bund.de/tags/DeutschlandDigitalSicherBSI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeutschlandDigitalSicherBSI</span></a> <a href="https://social.bund.de/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://social.bund.de/tags/OnlineSchutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineSchutz</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@avoidthehack" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>avoidthehack</span></a></span> : MFA/2FA using text messages, voice or authenticator aps was broken in 2019 (as Alex Weinert, Director of Identity Security at Microsoft, told us in <a href="https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/all-your-creds-are-belong-to-us/ba-p/855124" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/t5</span><span class="invisible">/microsoft-entra-azure-ad-blog/all-your-creds-are-belong-to-us/ba-p/855124</span></a>).</p><p>When using a password manager (which is the least bad solution), there are things you should take care of and settings that can prevent most phishing attacks, as I wrote in <a href="https://infosec.exchange/@ErikvanStraten/113277630925350550" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/113277630925350550</span></a>.</p><p><a href="https://infosec.exchange/tags/PasswordManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordManager</span></a> <a href="https://infosec.exchange/tags/CheckHttps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CheckHttps</span></a> <a href="https://infosec.exchange/tags/CheckDomainName" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CheckDomainName</span></a> <a href="https://infosec.exchange/tags/MakeBackups" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MakeBackups</span></a> <a href="https://infosec.exchange/tags/ProtectYourDevice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtectYourDevice</span></a> <a href="https://infosec.exchange/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a></p>
ENISA<p>R to <span class="h-card"><a href="https://respublicae.eu/@enisa_eu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>enisa_eu</span></a></span>: 🧐Take a look at our wagons🚃 and discover which are the <a href="https://respublicae.eu/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> habits that must be adopted to minimise cyber risks and protect data.</p><p>Follow the tips from our Streetcar named <a href="https://respublicae.eu/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a>🚆</p><p><a href="https://respublicae.eu/tags/CyberOnTrack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberOnTrack</span></a></p><p> 🐦🔗: <a href="https://nitter.cz/enisa_eu/status/1722634816913293445#m" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nitter.cz/enisa_eu/status/1722</span><span class="invisible">634816913293445#m</span></a></p><p>[2023-11-09 15:18 UTC]</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"Critical Alert! 🚨 Veeam ONE Monitor in the Crosshairs 🎯"</p><p>Veeam ONE -a comprehensive monitoring and analytics solution that is part of the Veeam Backup &amp; Replication suite- has issued a high alert 🛑, releasing hotfixes for four vulnerabilities in its Veeam ONE platform, with two critical risks scoring near the max on the CVSS scale (9.8/9.9). The most severe allows RCE and NTLM hash theft! Patch ASAP! 🛠️</p><p>Less critical but still noteworthy, CVE-2023-38549 and CVE-2023-41723 show that even with less privileged roles, Veeam ONE users could exploit XSS attacks and view sensitive schedules. Keep those defenses up! 🏰</p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Veeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Veeam</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreat</span></a> <a href="https://infosec.exchange/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://infosec.exchange/tags/DefenseInDepth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DefenseInDepth</span></a> <a href="https://infosec.exchange/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a></p><p>CVE Details: </p><ul><li>CVE-2023-38547: Potential SQL RCE <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38547" rel="nofollow noopener" target="_blank">MITRE ATT&amp;CK</a></li><li>CVE-2023-38548: NTLM hash theft <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38548" rel="nofollow noopener" target="_blank">MITRE ATT&amp;CK</a></li><li>CVE-2023-38549: XSS requiring admin interaction <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38549" rel="nofollow noopener" target="_blank">MITRE ATT&amp;CK</a></li><li>CVE-2023-41723: Schedule viewing without change permissions <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41723" rel="nofollow noopener" target="_blank">MITRE ATT&amp;CK</a></li></ul><p><a href="https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-bugs-in-veeam-one-monitoring-platform/" rel="nofollow noopener" target="_blank">Source</a> and <a href="https://www.veeam.com/kb4508" rel="nofollow noopener" target="_blank">Veeam Support Knowledge Base</a></p>
Craig Newmark<p>Taking a data-driven approach, @GlobalCyberAlln and @TidalCyber 's recent report validates the significant impact basic <a href="https://mastodon.social/tags/cyberhygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberhygiene</span></a> measures have in defense against the most relevant <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> methods of attack against <a href="https://mastodon.social/tags/SMBs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMBs</span></a>. Learn more at <br><a href="https://www.globalcyberalliance.org/reports_publications/defensive-measures-against-ransomware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">globalcyberalliance.org/report</span><span class="invisible">s_publications/defensive-measures-against-ransomware/</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 curl Vulnerability Alert: SOCKS5 Heap Buffer Overflow 🚨"</p><p>A critical heap buffer overflow vulnerability has been identified in <code>curl</code>, specifically in the SOCKS5 proxy handshake. When curl is instructed to pass the hostname to the SOCKS5 proxy for resolution, a hostname exceeding 255 bytes should trigger local name resolving. However, due to a bug, a slow SOCKS5 handshake might erroneously copy an overly long hostname to the target buffer instead of just the resolved address, causing a potential overflow. 🐛💻🔥</p><p>This flaw, tagged as CVE-2023-38545, affects libcurl versions 7.69.0 to 8.3.0 and has been assigned a high severity rating. The vulnerability was introduced when the SOCKS5 handshake code transitioned from a blocking function to a non-blocking state machine. The issue has been resolved in curl version 8.4.0, and users are urged to upgrade or apply patches to mitigate risks. 🛡️🔄</p><p>Source: <a href="https://curl.se/docs/CVE-2023-38545.html" rel="nofollow noopener" target="_blank">curl - CVE-2023-38545</a></p><p>Tags: <a href="https://infosec.exchange/tags/curl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curl</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CVE202338545" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202338545</span></a> <a href="https://infosec.exchange/tags/BufferOverflow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BufferOverflow</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/PatchManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchManagement</span></a> <a href="https://infosec.exchange/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a></p><p>👥 Credits: Reported and patched by Jay Satiro. A heartfelt thanks to Jay for enhancing the security of the digital realm!</p><p>🔗 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545" rel="nofollow noopener" target="_blank">MITRE CVE-2023-38545</a></p><p>🛠️ <strong>Recommendations:</strong></p><ol><li><strong>Upgrade</strong>: Update curl to version 8.4.0 or a newer release where the issue is fixed.</li><li><strong>Patch</strong>: If upgrading is not feasible, consider applying the provided patch to your local version of curl.</li><li><strong>Proxy Configuration</strong>: Avoid using CURLPROXY_SOCKS5_HOSTNAME proxies with curl.</li><li><strong>Environment Variables</strong>: Do not set proxy environment variables to socks5h://.</li></ol>
Dr. Pattie<p>A New View of Cyber Hygiene (pg. 171)<br><a href="https://mastodon.social/tags/MythAmerica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MythAmerica</span></a> <br>Click here to purchase: <br><a href="https://bit.ly/CyberMythsBook" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/CyberMythsBook</span><span class="invisible"></span></a>. <span class="h-card" translate="no"><a href="https://mstdn.social/@spaf" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>spaf</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@dykstra" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dykstra</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@theladyofgeek" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>theladyofgeek</span></a></span></p><p><a href="https://mastodon.social/tags/CybersecurityMythsAndMisconconceptions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersecurityMythsAndMisconconceptions</span></a> <br><a href="https://mastodon.social/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a> <a href="https://mastodon.social/tags/WashYourDirtyBits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashYourDirtyBits</span></a> <a href="https://mastodon.social/tags/ColdWaterWash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdWaterWash</span></a></p>
k3ym𖺀<p>I wanted to share this absolutely brilliant info-graphic put out by <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> about prioritization of the most impactful security measures you can implement. </p><p>I love that they call out that we should be implementing the basics of cyber hygiene even before purchasing all of the cool flashy security tools:</p><ul><li>Implement MFA</li><li>Patch Management</li><li>Backups</li><li>Minimize Attack Surface</li><li>Have (and test) your IR plan</li><li>Security awareness training</li></ul><p>All of the above can be achieved without investing in EDR/XDR, SIEM, SOAR, sandbox, etc. </p><p><a href="https://infosec.exchange/tags/backtothebasics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backtothebasics</span></a> <a href="https://infosec.exchange/tags/cyberhygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberhygiene</span></a></p>
Geekmaster 👽:system76:<p><span class="h-card"><a href="https://infosec.exchange/@jerry" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jerry</span></a></span> I believe this is an <a href="https://ioc.exchange/tags/InheritRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InheritRisk</span></a> working in the <a href="https://ioc.exchange/tags/EnterpriseSpace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnterpriseSpace</span></a>, especially the <a href="https://ioc.exchange/tags/FediSpace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FediSpace</span></a> (regardless of which country you work in). While this sucks generally, it appears on the surface that this could have been avoided by simply installing AV updates? That's <a href="https://ioc.exchange/tags/Security101" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security101</span></a>. Especially after they were already attacked. <a href="https://ioc.exchange/tags/ShouldHaveKnownBetter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShouldHaveKnownBetter</span></a>. </p><p>Not too comfortable with a 7-year jail sentence, but without knowing their local laws around this topic I can't really speak to that in depth.</p><p>It is another hard example of why regular <a href="https://ioc.exchange/tags/Patching" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patching</span></a> and <a href="https://ioc.exchange/tags/SystemUpdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemUpdates</span></a> are essential - at work and especially at home. Even if they are manually applied! It's not just good <a href="https://ioc.exchange/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a>, in many instances it is a regulatory or <a href="https://ioc.exchange/tags/LegalRequirement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LegalRequirement</span></a>.</p><p><a href="https://ioc.exchange/tags/HugYourInfosecTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HugYourInfosecTeam</span></a> 😬</p>