dice.camp is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon server for RPG folks to hang out and talk. Not owned by a billionaire.

Administered by:

Server stats:

1.5K
active users

#threatlandscape

0 posts0 participants0 posts today
kcarruthers<p>Just in case your <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatlandscape</span></a> wasn’t busy enough self replicating <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> is here 😱</p><p><a href="https://arxiv.org/abs/2412.12140" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2412.12140</span><span class="invisible"></span></a></p>
UK<p><a href="https://www.europesays.com/uk/37917/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/37917/</span><span class="invisible"></span></a> Live Webinar I Mitigate Risks from Quantum Computing and Comply with the Latest Compliance Requirements for FSIWebinar. <a href="https://pubeurope.com/tags/compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compliance</span></a> <a href="https://pubeurope.com/tags/Computing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computing</span></a> <a href="https://pubeurope.com/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputing</span></a> <a href="https://pubeurope.com/tags/RiskMitigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskMitigation</span></a> <a href="https://pubeurope.com/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://pubeurope.com/tags/thales" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thales</span></a> <a href="https://pubeurope.com/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a></p>
IntelSoup :donor:<p>Hello hive mind! I am looking for some good examples and write ups on how to complete a threat landscape assessment. Any good recommendations out there? </p><p><a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTI</span></a> <a href="https://infosec.exchange/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatlandscape</span></a> <a href="https://infosec.exchange/tags/strategicthreatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>strategicthreatintel</span></a> <a href="https://infosec.exchange/tags/threatassessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatassessment</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreatintelligence</span></a></p>
_Veronica_<p>Extremely grateful for having the opportunity to contribute to the latest ENISA Threat Landscape for DoS Attacks. It is an important report from ENISA that gives useful insights into a cybersecurity threat that is often understudied. Read here: <a href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-dos-attacks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">enisa.europa.eu/publications/e</span><span class="invisible">nisa-threat-landscape-for-dos-attacks</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatResearch</span></a> <a href="https://infosec.exchange/tags/DoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoS</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DenialOfService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DenialOfService</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/ENISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ENISA</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Juniper Firewalls Under Siege: Over 12,000 Vulnerable Devices Exposed! 🔥"</p><p>New research reveals nearly 12,000 internet-facing Juniper firewall devices are susceptible to a recently disclosed remote code execution flaw. The vulnerability, identified as CVE-2023-36845, allows an unauthenticated remote attacker to execute arbitrary code without creating a file on the system. This medium-severity flaw in the J-Web component of Junos OS can be weaponized by adversaries to control certain environment variables. Juniper Networks patched this alongside other vulnerabilities last month. A proof-of-concept (PoC) exploit by watchTowr combined CVE-2023-36846 and CVE-2023-36845 to upload malicious PHP files and achieve code execution. Jacob Baines points out, "Firewalls are interesting targets to APT as they help bridge into the protected network and can serve as useful hosts for C2 infrastructure." Juniper has acknowledged the vulnerability but is unaware of any successful exploits against its customers. However, they've detected exploitation attempts in the wild, urging users to apply necessary patches. 🛡️</p><p>Source: <a href="https://thehackernews.com/2023/09/over-12000-juniper-firewalls-found.html" rel="nofollow noopener" target="_blank">The Hacker News</a></p><p>Tags: <a href="https://infosec.exchange/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://infosec.exchange/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE202336845" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202336845</span></a> <a href="https://infosec.exchange/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://infosec.exchange/tags/JunosOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JunosOS</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatLandscape</span></a> 🌐🔐🔍</p>
CyberSec_EU 🇪🇺<p>Discover more on 20222 <a href="https://respublicae.eu/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> <a href="https://respublicae.eu/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://respublicae.eu/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatlandscape</span></a> <br>RT <span class="h-card"><a href="https://respublicae.eu/@enisa_eu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>enisa_eu</span></a></span>: 🆕 Volatile geopolitics shakes the trends of the 2022 <a href="https://respublicae.eu/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> Threat Landscape</p><p>Today <a href="https://respublicae.eu/tags/ENISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ENISA</span></a> launches its 10th annual threats overview where the geopolitical context has given rise to cyberwarfare and hacktivism.<br>Find out more 👉<a href="https://www.enisa.europa.eu/news/volatile-geopolitics-shake-the-trends-of-the-2022-cybersecurity-threat-landscape" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">enisa.europa.eu/news/volatile-</span><span class="invisible">geopolitics-shake-the-trends-of-the-2022-cybersecurity-threat-landscape</span></a> <a href="https://respublicae.eu/tags/ENISATL22" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ENISATL22</span></a> </p><p> 🐦🔗: <a href="https://nitter.eu/Cybersec_EU/status/1588114849963327488" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nitter.eu/Cybersec_EU/status/1</span><span class="invisible">588114849963327488</span></a></p>