med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

338
active users

#cybersec

3 posts3 participants0 posts today

So first real toot post #DEFCON. Ostrich Lab got 9th in ScavHunt, 14th at RedTeam, and >15 in Blue Team (looking for this number now). Got to see a bunch of people and have some good talks about why people should support Ostrich Lab.

Gave out a ton of stickers and card.. Some special edition NFC cards!

While this year was less about competing and more about building social connections and exploring more of the culture of DEFCON, I am proud of where the team placed. Next year we will show up to compete and bring home some hardware!

Recovery time isn't an option, the OL team is busy working on preparing some talks for the #Memphis #CyberSec scene, working on some coordinated disclosures, and designing the next Ostrich Lab #CTF

hej, ludzie od #cybersec #dataprivacy (@mateuszchrobok zerkam na Ciebie), czy system Public Alert System, dodawany automatycznie po podłączeniu się do siexi komórkowej, wysyłający powiadomienia zamiast SMSów, jak np. w Korei Południowej jest bardziej safe, mniej safe czy bez większych różnic od systemu Alert RCB działającego w Polsce?

I want to shout one more thing about personal info leaks that I haven't seen enough.

YOU CANNOT RESET YOUR FACE

If you get a text password stolen, yeah, it's a pain. But you can reset all passwords and five years from now it will be little more than a fun anecdote.

If you get your face, fingerprint or iris scan leaked when you are 30 years old, your face stays leaked when you are 70 years old. You cannot reset that shit for your whole life.

RealIDs are ticking time bombs.

So my first evil genius robot honeypot, the word frequency one, seems to be getting hit by a distributed botnet.

It started around 2-3 requests per second but seems to be ramping up.

It's using IP addresses from all over the world - could be hacked personal devices? - and a wide range of plausible-looking User Agent strings.

My server is fine for now - 95% idle CPU.

Are there people for whom any of the IP or agent data might be useful? Botnet detectorists?

From the "no-need-to-hack-when-it's-leaking-and-leaking-and-leaking" dept:

Website Planet recently reported on a leak Jeremiah Fowler discovered. But it wasn't the Gladney Adoption Center's first leak. And while Fowler praised the center for their response to his alert, DataBreaches wants to know what the Gladney Adoption Center is going to do to prevent more leaks. They've had 3 in the past few months alone.

databreaches.net/2025/07/17/gl

Great thanks to @JayeLTee for his help on this one.

theguardian.com/australia-news

The kicker for me is “We do not know comprehensively what information of yours was on the server but you should assume that any information you have provided would have been stored on the server." along with “We do not keep a record of all individuals who were on the server.” and that it was impractical to contact everyone who's data had been accessed.

I have never, ever seen such utter incompetence and disregard for the party members and supporters.

I hope the book gets thrown at the lot of them.

The Guardian · Clive Palmer’s Trumpet of Patriots and United Australia parties hit with data breachBy Josh Taylor

`The H/W Quick Erase function "uses high-voltage breakdown technology to physically destroy NAND Flash, ensuring data is irrecoverable," asserts Team Group. This patented technique is also shown in the video, where we see plumes of smoke emanate from the drive after the function is started. So, there's a visual and olfactory sign that data has been destroyed, in case you aren’t certain that you have chosen to fry the 3D TLC NAND.`

tomshardware.com/pc-components

Tom's Hardware · This new SSD will literally self destruct if you push the big red button it comes with — Team Group posts video of data destruction in actionBy Mark Tyson