Francesco P Lovergine · @gisgeek
53 followers · 111 posts · Server floss.social

After and changes in their policies, I'm now looking with suspect and reviewing all single-company projects without a clear story of multiple contributions, without a foundation based governance and/or subject to copyright for third parties contributions. (as the infamous MySQL one).
If you are strongly depending on such a project, it is time to sleep worried. We are living in very strange times.

#RedHat #hashicorp #OpenSource #FOSS #hijacking

Last updated 1 year ago

Richard Forrester - 🐦 escapee · @RichForrest2
258 followers · 5173 posts · Server aus.social
Leftist Lawyer · @LeftistLawyer
1003 followers · 291 posts · Server kolektiva.social

That is the and in under the guise of “parental rights” is pretty fucking ironic.

Ever notice how it’s always the people w/o who worry the most about “our” children. Real are to busy worrying about “their” children to the of “your” children.

For Christ sake, 1/2 the population of the probably hasn’t had since the #1960’s. “Our” children — my ass.

Parental rights? Yeah, right 🙄

#desantis #hijacking #1stamendment #education #florida #children #parents #legislate #morality #state #sex

Last updated 2 years ago

neto consulting · @neto
3 followers · 79 posts · Server mastodontech.de

Chrome-Browser-Erweiterung beim Hijacking von Konten erwischt

Google hat sich eingeschaltet, um eine gefälschte Chrome-Browsererweiterung zu entfernen, die sich als ChatGPT-Dienst von OpenAI ausgab, um Facebook-Sitzungscookies zu sammeln und die Konten zu kapern.
Quelle: thehackernews.com/2023/03/fake

Den ausführlichen Beitrag finden Sie auf unserer News Website unter: news.neto.consulting/#chatgpt_

#datenschutz #hackerangriff #hacker #cybersecurity #itsicherheit #hijacking #chatgpt #chrome

Last updated 2 years ago

bpolynet · @bpolynet
41 followers · 267 posts · Server mastodonapp.uk
Klaus-Gerd Giesen · @KlausGerdGiesen
157 followers · 207 posts · Server mastodon.social
Rob Carlson · @rob_carlson
379 followers · 813 posts · Server mastodon.world

I pulled that line out because " circuitry" is going to take on additional importance as this technology matures: .

I wrote about that in a well-reviewed chapter here:
Megatech: Technology in 2050
amazon.com/Megatech-Technology

#hijacking #neural #brainjacking

Last updated 2 years ago

Kevin Karhan :verified: · @kkarhan
707 followers · 31724 posts · Server mstdn.social

I guess @geerlingguy will likely have to make a video to get his daughters' school's of his account undone by Microsoft...

jeffgeerling.com/blog/2023/my-

#Microsoft #hijacking #YouTube

Last updated 2 years ago

Gᴇʀᴀʀᴅ Bᴀʀʀʏ · @gtbarry
60 followers · 352 posts · Server mastodon.social

GoDaddy suffered a multi-year security compromise that allowed unknown attackers to steal company source code, customer and employee login credentials. They were able to install malware that redirected customer websites to malicious sites, infect websites and servers with malware for phishing campaigns, malware distribution, and other malicious activities.

arstechnica.com/information-te

#godaddy #domain #databreach #hijacking #malware #phishing #security #cybersecurity #hackers #hacking #hacked

Last updated 2 years ago

No, seriously, I just want more news stories about animals caught doing something weird. Like an hiding in a trashcan, or a a golf cart, stuff like that. Why do we never have stories like that anymore?

#breakingnews #News #hijacking #raccoon #alligator

Last updated 2 years ago

CK's Technology News · @CKsTechNews
1891 followers · 4352 posts · Server cktn.todon.de

An crackdown on review on

IMHO the whole up and down-vote and comment system can only work if a moderator checks everything and this is too much work.

---
RT @guyfosel
An FTC crackdown on review hijacking on Amazon (or, as we called it internally: variation abuse).

This is an interesting enforcement action for two reasons: 👇
twitter.com/guyfosel/status/16

#ftc #hijacking #amazon

Last updated 2 years ago

Lukas Beran · @lukasberancz
8 followers · 16 posts · Server infosec.exchange

Do you know how authentication works in ? The purpose of is to verify that we really are who we say we are. But how is it possible that our login remains active even if we close the browser? Let's take a look at how tokens work in Azure AD.

After a successfully authentication, Azure AD issues a set of . An access token defaults to one hour and grants the user access to a single resource. If a user accesses multiple resources, they will have multiple access tokens.

A refresh token, on the other hand, has essentially unlimited validity and its only purpose is to issue a new access token when the existing one expires, or to issue a new access token for a different resource, giving us a single sign-on () experience.

So, at first glance, the user sees that they are permanently logged in to all services, but in the background, at least once an hour, an authentication process takes place (can be seen in the Azure AD log) and new tokens are issued.

This background process is essential to understand other contexts, for example in the validation of conditional access policies, the new authentication method called Continuous Access Evaluation (CAE), but also to protect tokens from misuse for example in or -the-token. More on that next time 😊

#azuread #authentication #tokens #sso #session #hijacking #pass

Last updated 2 years ago

PSiReN-X · @PSiReN
3 followers · 619 posts · Server vmst.io

@selzero @therivercrow

At the of inadvertently this ; the and of is...

There's a about... 's

are ...

🧙⚔️🤖🐺🤖⚔️🧙 | 🎠🦹☕🦄☕🦹🎠

#risk #hijacking #transissue #unspeakablecruelty #brutality #humans #horrific #lotofit #it #allsosad #animals #betterthan

Last updated 2 years ago

Sai · @akaSAI
0 followers · 8 posts · Server infosec.exchange

Top 13 Types - Barracuda Networks

barracuda.com/solutions/13-ema

1.
2.
3. exfiltration
4. URL
5. Lateral phishing
6. Spear phishing
7. Brand
8. Domain Impersonation
9. Business email compromise
10.
11.
12. Account
13. Conversation

#free #cybersecurity #ebook #email #threat #spam #malware #data #phishing #impersonation #scamming #blackmail #takeover #hijacking

Last updated 2 years ago

sudoheader :verified: · @sudoheader
14 followers · 42 posts · Server infosec.exchange
CK's Technology News · @CKsTechNews
1811 followers · 2940 posts · Server cktn.todon.de
5OUTH W35T OHIO ANONS · @LinuxRoot
44 followers · 416 posts · Server kolektiva.social
DarkOperator 🚀 · @DarkOperator
1168 followers · 1378 posts · Server infosec.exchange
Matt Knight · @matt
98 followers · 308 posts · Server mastodon.knight.fyi

As instances grow and turn to automation, many of the same technologies as for SMTP will translate - , public and will be evaluated. How long before small instances find it near impossible to federate?

And malicious actors will have all the same techniques available too - instance , IP forwarding, etc. Protections like signed messages are analogous to email's .

We've seen it before. How do we do it differently this time?

#mastoadmins #antispam #blocklists #reputation #hijacking #activitypub #dkim

Last updated 2 years ago

CK's Technology News · @CKsTechNews
1490 followers · 183 posts · Server cktn.todon.de