101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

491
active users

#ttps

0 posts0 participants0 posts today
Stratosphere Research Laboratory<p>🚨 The wait is over — the full program of briefings for the Honeynet Project Workshop 2025 in Prague is now live! 🎉</p><p>We’re proud to present an incredible lineup of speakers from across the globe, sharing cutting-edge work in cyber deception, honeypots, threat intelligence, and more. 🐝🌍</p><p>📍 NTK, Prague<br>🗓 June 2–4, 2025<br>👉 Register today: <a href="https://prague2025.honeynet.org/program/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">prague2025.honeynet.org/progra</span><span class="invisible">m/</span></a></p><p><a href="https://infosec.exchange/tags/Honeynet2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Honeynet2025</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/deception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deception</span></a> <a href="https://infosec.exchange/tags/cyberdeception" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdeception</span></a> <a href="https://infosec.exchange/tags/TI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TI</span></a> <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
Sekoia.io<p>Our new report describes one of the latest observed infection chains (delivering <a href="https://infosec.exchange/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a>) relying on the <a href="https://infosec.exchange/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> tunnel infrastructure and the attacker’s <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a> with a principal focus on detection opportunities. </p><p><a href="https://blog.sekoia.io/detecting-multi-stage-infection-chains-madness/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sekoia.io/detecting-multi</span><span class="invisible">-stage-infection-chains-madness/</span></a></p>
isecjobs.com<p>HIRING: Staff Security Engineer – Security Operations and Incident Response / Remote (Non CA)<br>💰 USD 125K+</p><p>👉 <a href="https://isecjobs.com/J594690/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">isecjobs.com/J594690/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloud</span></a> <a href="https://mastodon.social/tags/ComputerScience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComputerScience</span></a> <a href="https://mastodon.social/tags/Incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Incidentresponse</span></a> <a href="https://mastodon.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/Scripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scripting</span></a> <a href="https://mastodon.social/tags/Splunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Splunk</span></a> <a href="https://mastodon.social/tags/Threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Threatdetection</span></a> <a href="https://mastodon.social/tags/Threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Threatintelligence</span></a> <a href="https://mastodon.social/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a></p>
JHunt :donor:​ :rebelverified:<p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/Mitre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mitre</span></a> <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a> <br>Here's a one-liner to pull down a threat actor json file and extract the TTPs and put them in comma separated format</p><p>curl <a href="https://attack.mitre.org/groups/G0092/G0092-enterprise-layer.json" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">attack.mitre.org/groups/G0092/</span><span class="invisible">G0092-enterprise-layer.json</span></a> | jq -r '.techniques[].techniqueID' | sort -u | tr -s '\r\n' ',' | sed -e 's/,$/\n/'</p>
𝖈0𝖗𝖊𝖉𝖚𝖒𝖕𝖊𝖉 🇸🇪<p><span class="h-card"><a href="https://infosec.exchange/@0xF21D" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>0xF21D</span></a></span> those were just what came up, <a href="https://infosec.exchange/tags/incindent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incindent</span></a> <a href="https://infosec.exchange/tags/breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>breach</span></a> <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a> <br>I dunno, those could also match, but i figure if you check out the sec operstions ppl you follow you'll see what they use as name for the hashtags and in that way be able to trim</p>
TropChaud<p><a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a> I'm Scott, currently Director of Cyber Threat Intelligence <span class="h-card"><a href="https://infosec.exchange/@tidalcyber" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tidalcyber</span></a></span> <br>I like to post about an oddly specific but exciting niche: aggregating &amp; visualizing large <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> related datasets</p><p>I've had a 10-year career in <a href="https://infosec.exchange/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a>, all in the private sector, which provides interesting perspective on <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> and threatintel challenges<br>I've come to believe in the value of using <a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTI</span></a> around actor <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a> to drive improvements in defense<br>My favorite <a href="https://infosec.exchange/tags/mitreattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mitreattack</span></a> technique is T1027</p><p>In my free time, I like building &amp; contributing to open source projects<br>Check out my <a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> tool &amp; resource aggregator, MetaOSINT: <a href="https://metaosint.github.io/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">metaosint.github.io/</span><span class="invisible"></span></a><br>In my non-cyber free time, I'm training to become the next Ninja Warrior</p><p>At Tidal, I'm excited to get to help build out our Community, a growing group all motivated around realizing the benefits of threat-informed defense, and share a ton of publicly available, interesting resources. Check out the free Community Edition (and sign up to join our Slack!): <a href="https://app.tidalcyber.com/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">app.tidalcyber.com/</span><span class="invisible"></span></a></p>
Dov Lerner<p>For all those interested in <a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialengineering</span></a> and/or protecting <a href="https://infosec.exchange/tags/retail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retail</span></a>, here's a piece that we just published reviewing refund fraud, in which threat actors claim undeserved refunds from retailers. We look at the most-targeted retailers and review some of the latest <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a>, as discussed on the deep and <a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darkweb</span></a>.</p><p><a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p><p><a href="https://news.cybersixgill.com/heres-how-scammers-commit-refund-fraud-to-steal-from-retailers/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.cybersixgill.com/heres-ho</span><span class="invisible">w-scammers-commit-refund-fraud-to-steal-from-retailers/</span></a></p>
isecjobs.com<p>HIRING: Cyber Evaluations &amp; Inspection Coordinator / Hampton, VA, United States <a href="https://infosec-jobs.com/J18648/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">infosec-jobs.com/J18648/</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/InfoSecJobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecJobs</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/jobsearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jobsearch</span></a> <a href="https://mastodon.social/tags/hiringnow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hiringnow</span></a> <a href="https://mastodon.social/tags/CyberCareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCareer</span></a> <a href="https://mastodon.social/tags/Hampton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hampton</span></a> <a href="https://mastodon.social/tags/VA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VA</span></a> <a href="https://mastodon.social/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedStates</span></a> <a href="https://mastodon.social/tags/DoD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoD</span></a> <a href="https://mastodon.social/tags/Governance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Governance</span></a> <a href="https://mastodon.social/tags/Networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networksecurity</span></a> <a href="https://mastodon.social/tags/TSSCI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TSSCI</span></a> <a href="https://mastodon.social/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a></p>