101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

517
active users

#runzero

0 posts0 participants0 posts today
AJCxZ0<p>Assets.</p><p>Thank you, <span class="h-card" translate="no"><a href="https://infosec.exchange/@runZeroInc" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>runZeroInc</span></a></span>.</p><p><a href="https://infosec.exchange/tags/runZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runZero</span></a> <a href="https://infosec.exchange/tags/AssetDiscovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AssetDiscovery</span></a> <a href="https://infosec.exchange/tags/NetworkDiscovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkDiscovery</span></a> <a href="https://infosec.exchange/tags/NetworkScanning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkScanning</span></a> <a href="https://infosec.exchange/tags/AttackSurface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AttackSurface</span></a> <a href="https://infosec.exchange/tags/CAASM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CAASM</span></a> <a href="https://infosec.exchange/tags/CyberAssetAttackSurfaceManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAssetAttackSurfaceManagement</span></a> <a href="https://infosec.exchange/tags/ExposureManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExposureManagement</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Kevin Neely :donor:<p>I received a notice that <a href="https://infosec.exchange/tags/letsencrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>letsencrypt</span></a> will cease sending email notices for expiring certificates, so I'm configuring my <a href="https://infosec.exchange/tags/RunZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RunZero</span></a> instance to display upcoming expirations on the dashboard. </p><p>While doing this, I discovered that my <a href="https://infosec.exchange/tags/chromecast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chromecast</span></a> is pulling down certificates with a 48 hour TTL. Looks like <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> is getting serious about shortening <a href="https://infosec.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLS</span></a> certificate lifespans.</p>
runZero, Inc<p>⚡ It's a new year and we've got new exposure management features for you! See how runZero's Inside-Out Attack Surface Management capabilities uncover exposures that are impossible to find through attribution alone.</p><p>External attack surface management (EASM) tools (including runZero) are great for identifying exposures in well-known organizational resources, but they miss exposures where attribution is impossible using IP addresses and domain names alone.</p><p>To uncover these hidden threats, you need detailed knowledge of your internal assets. With runZero’s Inside-Out ASM, we bridge the gap — connecting internal data powered by advanced fingerprinting with external discoveries to pinpoint publicly exposed assets, no matter what or where they are.</p><p>💡 Learn more about this innovative approach in our latest blog: <a href="https://www.runzero.com/blog/inside-out-attack-surface-management/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">runzero.com/blog/inside-out-at</span><span class="invisible">tack-surface-management/</span></a></p><p>🎙️ Tune into runZero Hour tomorrow to learn more: <a href="https://www.runzero.com/research/runzero-hour/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">runzero.com/research/runzero-h</span><span class="invisible">our/</span></a></p><p><a href="https://infosec.exchange/tags/IOASM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOASM</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/EASM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EASM</span></a> <a href="https://infosec.exchange/tags/runZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runZero</span></a> <a href="https://infosec.exchange/tags/TechInnovation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechInnovation</span></a></p>
runZero, Inc<p>Siemens disclosed 20+ vulnerabilities in its SENTRON, SCALANCE, and RUGGEDCOM product lines. Several vulnerabilities have CVSS scores ranging from 7.0 to 10.0, and the impacts vary from remote code execution to privilege escalation to information disclosure to denial of service.</p><p>Learn more about the vulnerabilities: <a href="https://www.runzero.com/blog/siemens-devices/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">runzero.com/blog/siemens-devic</span><span class="invisible">es/</span></a></p><p>Use runZero to find affected systems on your network: <a href="https://www.runzero.com/try/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">runzero.com/try/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/runzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runzero</span></a> <a href="https://infosec.exchange/tags/rapidresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rapidresponse</span></a></p>
runZero, Inc<p>Did you know that the discrepancy between ICMP and TCP syn response times can reveal if a device is the real thing or a lookalike?</p><p>Watch the entire fourth episode of runZero Hour for this and other insights: <a href="https://youtu.be/m8JE5ZtKvOI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/m8JE5ZtKvOI</span><span class="invisible"></span></a></p><p>Try runZero for free: <a href="https://www.runzero.com/try/signup/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">runzero.com/try/signup/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/runzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runzero</span></a> <a href="https://infosec.exchange/tags/runzerohour" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runzerohour</span></a> <a href="https://infosec.exchange/tags/fingerprinting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fingerprinting</span></a> <a href="https://infosec.exchange/tags/scanning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scanning</span></a></p>
runZero, Inc<p>Progress Software disclosed a vulnerability in its OpenEdge Authentication Gateway and AdminServer applications. <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-1403 allows attackers to bypass authentication and access affected systems with arbitrary privileges.</p><p>Learn more about the <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a>: <a href="https://www.runzero.com/blog/finding-progress-openedge/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">runzero.com/blog/finding-progr</span><span class="invisible">ess-openedge/</span></a></p><p>Use runZero to find potentially vulnerable installations: <a href="https://www.runzero.com/try/signup/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">runzero.com/try/signup/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/runzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runzero</span></a> <a href="https://infosec.exchange/tags/rapidresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rapidresponse</span></a></p>
runZero, Inc<p>ConnectWise has disclosed two serious <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> in their ScreenConnect (formerly Control) remote access product. The first vulnerability allows attackers to bypass authentication to execute arbitrary commands with full privileges. The second issue is a path-traversal vulnerability that allows attackers to access restricted resources.</p><p>Learn more about the vulnerability: <a href="https://www.runzero.com/blog/finding-connectwise-screenconnect/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">runzero.com/blog/finding-conne</span><span class="invisible">ctwise-screenconnect/</span></a></p><p>Use runZero to find <a href="https://infosec.exchange/tags/connectwise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>connectwise</span></a> ScreenConnect on your network: <a href="https://www.runzero.com/try/signup/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">runzero.com/try/signup/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/runzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runzero</span></a> <a href="https://infosec.exchange/tags/rapidresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rapidresponse</span></a></p>
runZero, Inc<p>Microsoft has disclosed a <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> (<a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-21410) in <a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> Exchange that would allow attackers to authenticate to <a href="https://infosec.exchange/tags/microsoftexchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftexchange</span></a> servers using a captured NTLM hash (a so-called “pass-the-hash” vulnerability). This would allow an attacker to authenticate to an Exchange server as any user.</p><p>Learn more about the vulnerability: <a href="https://www.runzero.com/blog/finding-microsoft-exchange/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">runzero.com/blog/finding-micro</span><span class="invisible">soft-exchange/</span></a></p><p>Use runZero to find Exchange servers on your network: <a href="https://www.runzero.com/try/signup/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">runzero.com/try/signup/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/runzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runzero</span></a> <a href="https://infosec.exchange/tags/rapidresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rapidresponse</span></a></p>
Rob Pomeroy<p><span class="h-card"><a href="https://infosec.exchange/@SecureOwl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SecureOwl</span></a></span> Along a similar theme to SnipeIT, I am truly blown away runZero, particularly because it's virtually effortless. That is its unique party trick. Free for networks with fewer than 256 endpoints, which is plenty for home labs and evaluation.</p><p>Props to <span class="h-card"><a href="https://infosec.exchange/@hdm" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hdm</span></a></span> and his team.</p><p>(I'm not affiliated in any way.)</p><p><a href="https://infosec.exchange/tags/runZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>runZero</span></a> <a href="https://infosec.exchange/tags/AssetManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AssetManagement</span></a></p>