med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

355
active users

#networksecurity

2 posts2 participants1 post today

🎥 What is O-RAN, really?

O-RAN isn't just a buzzword — it's a structural shift in how we build radio access networks.

By moving away from proprietary, locked-in systems and toward open, cloud-native architectures, operators gain flexibility… but also inherit new risks.

At the beginning of this analysis, we lay the groundwork — defining what O-RAN is before unpacking the security implications throughout the session.

▶️ Watch the full webinar for the complete breakdown: app.getcontrast.io/register/p1

Replied in thread

@VXShare @StarkRG @jay @vildis @vxunderground OFC, if their corporate firewall didn't blocklist your domain, most #MITM-based "#NetworkSecurity" solutions and "#EndpointProtection" will checksum files and instantly yeet them into the shadow realm.

  • Researchers should OFC only run those said malware only for research purposes and on #airgapped, sanctioned systems but they need to get their hands on them in the first place.

And lets be honest: Like with chemistry and medicine, one wants to have a supplier that isn't shady af but actually transparent.

  • The "alternative" would be to go into some "dark corners" and risk getting something else entirely.

Over the past few days I've installed some blocklists into the PowerDNS Recursor instances on our home network. This is similar to what a Pi-Hole does, but without needing a second hop for all the DNS queries to pass through.

Today, with some guidance from the lovely community in the PowerDNS IRC channel, I set up logging so I'll be able to see which queries were blocked (the requesting address and the QNAME). I've been watching it a bit for about an hour, and it's rather shocking. Opening the Slack app on my phone, which does not display any advertisements, triggered a flurry of DNS queries for various ad-related services.

It will be interesting watching this over the next week or two, partially to see if anything we regularly use is actually broken or even changed at all, and to see what the volume is.

Hey #InfoSec and #Cybersecurity folks. My company's conference, LogicON 2025, is coming up in Dublin, OH.

It's a solid event with practical tracks on compliance, automation, & security ops. Also, you can earn up to 16 CPE credits toward your ISC2 certification renewal.

No marketing fluff, just good info from fellow engineers & IT leaders. It's a great opportunity to learn something new.

Check out the agenda and register here: whova.com/portal/registration/

🚀 My new #DDoS book "DDoS: Understanding Real-Life Attacks and Mitigation Strategies" is now also available as an eBook! 🎉

Check it out here: ddos-book.com/

I’ve packed in everything I’ve learned from defending major German government sites against groups like Anonymous, Killnet, and NoName057(16).

It covers mitigations against #AI #crawlers and many other defenses for all network layers.

If you find it useful, I’d love it if you could boost and share to help more people defend themselves. ❤️

Thank you! 🙏

Sunday, June 1, 2025

UK identifies Russia as an ‘immediate and pressing’ threat in new defense review — Ukraine’s enduring cyber defense: Assessing resilience and impact of shifting international support — European leaders shift focus to defending Ukraine without US support — Pompeo urges Trump not to legitimize Russia’s land grabs in Ukraine … and more

activitypub.writeworks.uk/2025

I love the new zone management of the Unifi firewall. I feel more comfortable now being more granular in my rules. Before, I was using Cloudflare DNS proxy to only allow three countries to connect to my public services.

Now, I’m no longer using the DNS proxy, and my rule is done with Unifi. Other improvement, my public services are in an isolated VLAN and are available on IPv4 and IPv6.

Types of DNS Attacks You Should Know ⚔️🌐🔍

The Domain Name System (DNS) is a core part of how the internet works — and it’s also a prime target for attackers. Understanding DNS attack types is essential for defending network infrastructure.

🛠️ Common DNS Attack Types:

1. DNS Spoofing / Cache Poisoning
→ Injects false DNS data into a resolver's cache to redirect users to malicious sites.

2. DNS Tunneling
→ Encodes data into DNS queries/responses to exfiltrate data or establish covert C2 channels.

3. DNS Amplification (DDoS)
→ Exploits open DNS resolvers to flood a target with amplified traffic.

4. NXDOMAIN Attack
→ Overloads DNS servers with queries for nonexistent domains, degrading performance.

5. Domain Hijacking
→ Unauthorized changes to DNS records or domain ownership to take control of web traffic.

6. Typosquatting / Homograph Attacks
→ Uses lookalike domains to trick users into visiting malicious sites.

7. Subdomain Takeover
→ Targets misconfigured DNS entries pointing to expired resources (e.g., GitHub Pages, AWS buckets).

Why it matters:
DNS is often overlooked in security strategies, but it’s a critical attack surface. Proper monitoring, DNSSEC, and logging can reduce risk.

Disclaimer: This content is for educational and awareness purposes only.

Wireless Security Protocols Explained: WEP, WPA, WPA2 & WPA3 📡🔐

Understanding wireless security protocols is essential for protecting your network from unauthorized access and ensuring data confidentiality.

📘 Key Protocols & Their Characteristics:

1. WEP (Wired Equivalent Privacy)
• Introduced in 1997
• Weak encryption (RC4), easily cracked
• Deprecated and insecure

2. WPA (Wi-Fi Protected Access)
• Interim solution after WEP
• Improved encryption with TKIP
• Still vulnerable to certain attacks

3. WPA2
• Widely used today
• Uses AES-based CCMP encryption
• Supports enterprise (RADIUS) and personal (PSK) modes

4. WPA3
• Latest standard with stronger security
• Resistant to brute-force attacks
• Supports SAE (Simultaneous Authentication of Equals)
• Enhanced encryption and forward secrecy

Why it matters:
Choosing the right wireless protocol significantly affects your network’s resilience against common attack vectors such as packet sniffing, replay attacks, and credential theft.

Disclaimer: This post is for educational and awareness purposes only. Always secure your wireless networks using the latest standards.