dice.camp is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon server for RPG folks to hang out and talk. Not owned by a billionaire.

Administered by:

Server stats:

1.6K
active users

#informationsecurity

2 posts2 participants1 post today

A vulnerability on a security chip present in over 100 Dell laptop models could allow attackers to steal sensitive data and monitor some computer activities.

mobilesyrup.com/2025/08/05/del
- - -
Une vulnérabilité dans une puce de sécurité présente dans plus de 100 modèles d'ordinateurs portables Dell pourrait permettre aux attaquants de voler des données sensibles et de surveiller certaines activités informatiques.

// Article en anglais //

MobileSyrup · Dell fixed security chip vulnerability that left millions open to attackDell just fixed a major issue with its high-security laptops, meaning they were vulnerable to attack before that.
Continued thread

Lobenwein and Rous emphasise that, when studying diplomatic practice and the transfer of information, the interplay between orality, writing and other media is crucial; this also applies when dealing with the practices of espionage. Information that was supposed to remain secure was mainly transmitted orally. (6/7)

#emdiplomacy #NewDiplomaticHistory #espionage #history #histodons #earlyModern #InformationSecurity

@MaxWeberStiftung @histodons @historikerinnen @earlymodern @womenknowhistory

Can AI help you examine leaked data safely?
If you do it right, it can...

In this blog post, our Luke Davis looks at how internal chatbot systems, built on private large language models, can support forensic investigations.

He shows how AI can help find important information in big datasets and speed up analysis.

📌Read here: pentestpartners.com/security-b

To make sure the AI output is correct, it should always be checked against the raw dataset.

If you have to notify a small biz that they’ve been compromised (especially if you have to ask awkward questions about their security posture), try to remember to be kind.

Look to be empathetic rather than smug.

Yes, you infosec genius, you’ve seen and done it all and you have earned a jaded moment (and those of us in the business will pat you on the back later). Just, keep it to yourself a little, because shame and gloating is not a part of anyone’s remediation plan.

#InformationSecurity
#InfoSec

Il y a eu une fuite de données récemment chez #Leclerc ?
#Leclerc s'est fait pirater ? 🤔

Des clients ont reçu ce mail hier (7 juil. 2025 vers 17:00)

Bonjour,
La sécurité de vos données est notre priorité absolue. Chez E.Leclerc, nous mettons tout en œuvre pour vous offrir une expérience d’achat en magasin et en ligne sécurisée.

Désormais, lorsqu’une nouvelle connexion à votre Compte* est détectée, un code de sécurité à 6 chiffres peut vous être envoyé par email.
En plus de votre mot de passe habituel, cette double authentification renforcée garantit que vous seul pouvez accéder à votre Compte.

C'est bien, Leclerc pense enfin aux données de ses clients 😏
Données qu'il préfère vendre pour se faire un petit plus de pognon sur le dos de ses clients, plutôt que de laisser des pirates le carotter en vendant ces fameuses données à sa place, d'où ce mail pour avertir qu'il veut protéger un peu plus ses clients 😏

Sérieux, ce ne serait pas cool du tout pour Leclerc de se faire "couillonner, flouer, dérober... et j'en passe" 🤣

Allez, c'est tout pour le moment 😉

#hacking #online #privacy #it #cybercrime
#cybersecurity #informationsecurity #dataprotection
#technology

Hi everyone! I recently released 3 blog posts!
All of them are writeups on CTFs where I make some scripts and tools in bash and golang!

I'll leave you the link of the blog posts and if you have any suggestions or interact with me, don't hesitate to comment or DM me!

I hope you all can enjoy reading them!

blog.jackrendor.dev/posts/tryh

blog.jackrendor.dev/posts/tryh

blog.jackrendor.dev/posts/tryh

Jack Rendor's blog - Penetration Tester and Security Researcher · Tryhackme Security FootageWriteup on Security Footage, a room from TryHackMe where I explore the possible ways to extract files from a pcap file.

When teaching people about digital security for everyday people & organizers, is there are tool that anyone can recommend **for threat modeling, specifically?**

Folks can often fall into security nihilism or an extreme belief that anything technically possible, even if resource intensive, is likely to come to pass with them as a target, so I'd like to start by getting people grounded in likely threats they should be thinking about.