toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

334
active users

#smb

3 posts3 participants0 posts today

Quantum computing is poised to break some of today's popular encryption standards. Is your organization ready?

From e-commerce transactions to email security, quantum advancements threaten to upend how organizations secure information. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin cut through the hype and explain what your organization needs to do now to prepare.

Learn:
• What encryption standards will be broken
• How post-quantum cryptography (PQC) is evolving
• Key steps to protect long-term confidential data
• How to future-proof your encryption strategy

🎥 Watch the full episode: youtu.be/MnhAm4f7Bqk

🎧Listen to the podcast: chatcyberside.com/e/quantum-ap

Microsoft 365 credential theft is evolving quickly!

Attackers are no longer just stealing your login—they’re using your own AI tools like Microsoft Copilot to accelerate fraud from inside your environment.

Our 4-minute video breaks down how threat actors are targeting Microsoft 365 accounts and weaponizing Copilot, Teams, SharePoint, and more to perform rapid reconnaissance, commit fraud, and exploit centralized trust systems.

Watch now to learn:

▪ How Copilot can be used against you
▪ Real phishing tactics mimicking Microsoft 365, Adobe & DocuSign
▪ Why SSO, OAuth, and poor access controls can make attacks worse
▪ What your organization must do to stay ahead

Watch the video! youtu.be/zaBwxy1Gjhc

How your team responds to a data breach can make a $1.5 million difference in damages. In our latest blog, Security Consultant Derek Rowe answers frequently asked questions about critical incident response training. This FAQ covers everything from what to look for in a class and how to grade your IT training maturity, to how IT training impacts compliance and BCDR.

Don’t wait for an attack to find out how prepared your team is. Read the blog: lmgsecurity.com/critical-incid

Critical incident response training FAQ
LMG SecurityCritical Incident Response Training: Your Top Questions Answered | LMG SecurityGet answers to your top questions about critical incident response training, and why it’s essential for cybersecurity success in 2025!

I have finally caved in and dove into the rabbit hole of #Linux Container (#LXC) on #Proxmox during my exploration on how to split a GPU across multiple servers and... I totally understand now seeing people's Proxmox setups that are made up exclusively of LXCs rather than VMs lol - it's just so pleasant to setup and use, and superficially at least, very efficient.

I now have a
#Jellyfin and #ErsatzTV setup running on LXCs with working iGPU passthrough of my server's #AMD Ryzen 5600G APU. My #Intel #ArcA380 GPU has also arrived, but I'm prolly gonna hold off on adding that until I decide on which node should I add it to and schedule the shutdown, etc. In the future, I might even consider exploring (re)building a #Kubernetes, #RKE2 cluster on LXC nodes instead of VMs - and if that's viable or perhaps better.

Anyway, I've updated my
#Homelab Wiki with guides pertaining LXCs, including creating one, passing through a GPU to multiple unprivileged LXCs, and adding an #SMB share for the entire cluster and mounting them, also, on unprivileged LXC containers.

🔗 https://github.com/irfanhakim-as/homelab-wiki/blob/master/topics/proxmox.md#linux-containers-lxc

Building the latest version of samba from source on my Raspberry Pi 5 because whenever I access my share from iPhone or iPad - even though I log in as a registered user - I only have read access.

On a Mac in Finder everything works perfectly well - just like on other Linux/Windows systems.

Hopefully newer SMB version will help.
Or if you guys know what might be the reason - help is greatly appreciated 🙌.

#linux#samba#smb

My #Jellyfin and #Plex setup are pretty similar, i.e. on #Debian/#Ubuntu VMs with a mount pointing to my #SMB share from my #NAS, using native installations rather than #Docker, etc. I just noticed though, that there are some of my media folders that I currently have setup using relative symlinks.. for example:

MyMedia -> ../Videos/Media

and the videos within them (of which are mostly also relative symlinks) are not appearing/discovered on Jellyfin, when they do on Plex. The result is, based on my example, my media library on Jellyfin, which is pointing to a folder that contains various other folders including "MyMedia", is not able to discover the "MyMedia" folder - it only displays folders that are actual folders and not symlinks. Can someone tell if this is expected, and something not supported on Jellyfin?

I also have instances where I have movies stored in my Movies media folder, then have a (relative) symlink pointing to the movie from, for example, an anime's "Specials" folder so that users can discover/watch them as a standalone movie, or alongside their TV series progress - I'm wondering now if those files are also not appearing too since they too are symlinks.

On the server itself, both Jellyfin and Plex, the mount is configured exactly the same, and simply using
ls, it doesn't seem either of them have difficulty or different behaviours following the "trail" from the symlink to the target file or folder.

---

Edit: From what I've found so far, it seems that Jellyfin straight up ignores symlink files, which is... ridiculous. I know I can prolly use hardlinks, at least I expect I can, but that's just so stupid and not what I want.

A lot of my home videos are organised in such a way that relies heavily on relative symlinks, so that one video can be linked to several folders (i.e. my personal folder and my family's etc. if it's related to them), and that they're easy to trace. I even do this for photos, so I can link a single photo into multiple folders (i.e. who's in them, the event that took place, etc.) without taking up additional space.

I also use relative links, instead of absolute links, so that they can be read/followed on no matter what system of mine I'm using that has the SMB share mounted - regardless of their mount point (i.e.
#Linux and #macOS have different file structure etc.).

Ngl out of all
hitches I've encountered in my migration from Plex to Jellyfin, this might be the most bitter pill I'm to swallow - cos I don't think I can work around this, reasonably, without making changes to my SMB share that I'm not only using for Jellyfin, but a lot of other things as well for me to even consider tailor/catering it solely for Jellyfin and potentially break the workflow of a lot of other things I rely on.

🔗 https://forum.jellyfin.org/t-can-t-read-symlink-files

🔗 https://github.com/jellyfin/jellyfin/issues/5521
forum.jellyfin.orgCan't read symlink filesHello!, I'm trying to figure out why my Jellyfin setup can't read symlink files, I'm following this guide to locally mount my debrid files through rclone on a new path /mnt/jellyfin, no problems there

Help Desk Spoofing + Email Bombing = A Dangerous New Combo

Attackers are posing as internal IT staff, using email bombing to distract users and gain remote access—often deploying ransomware through Microsoft Teams and Quick Assist.

Watch the video to see a real-world example of how cybercriminals bypass traditional phishing defenses using cloud tools and AI-driven social engineering. We'll also share how to protect your organization with better verification, secure configurations, and smart incident response planning. youtu.be/RhKFx_ZRz4A

Mass-targeting SMBs has become a new battleground in cybersecurity. Small businesses must be ready to face this threat or risk losing out on critical sales. Even the basic steps (backups, simple plans, 2FA) significantly reduce the impact of incidents.
#SMB #cybersecurity
financialpost.com/technology/t

Financial Post · OPINION: Reality of cybersecurity for small businesses  By Canadian Cybersecurity Network

Did you know a ransomware tabletop exercise can uncover gaps and failure points in your incident response plan? A recent study found it can also reduce your data breach costs by an average of $248K! If you have not planned a ransomware tabletop exercise already, it's time to put this on your schedule!

In our new blog, we share common failure points, @MDurrin's favorite ransomware tabletop exercise scenarios, and tips to help you get the most out of your next exercise.

Read the blog: lmgsecurity.com/how-a-ransomwa

LMG SecurityHow a Ransomware Tabletop Exercise Can Dramatically Reduce Your Losses If You’re Attacked | LMG SecurityA Ransomware Tabletop Exercise is one of the best ways to test your organization’s ability to handle an attack, identify process gaps, & ensure a rapid response that reduces your losses. Read our favorite scenarios and tips!

LMG Security’s Top Cybersecurity Control for Q1 2025 is AI Readiness!

AI is transforming cybersecurity, but are you prepared for the risks? LMG Security's @sherridavidoff outlines key steps to reduce your organization's cybersecurity risks from AI-powered threats.

From shadow AI usage to data leakage and adversarial attacks, organizations must take proactive steps now to protect their systems. Learn how to build AI security policies, monitor AI implementations, and defend against emerging threats in this new blog. lmgsecurity.com/ai-readiness-t

LMG SecurityAI Readiness: The Top Cybersecurity Control of Q1 2025 | LMG SecurityAI-driven tools are revolutionizing security defenses, but they’re also exposing organizations to new risks. Read our AI readiness steps that will protect your organization and data.
Day 29 of 30 Days of Local Food: Vincenzo's

We’ve a few food landmarks in this town, and I think Vincenzo’s is one. I’ve been shopping here for a couple of decades. Here’s where I find those ingredients that my favourite food writers call for. Here’s where I find ingredients made by small Canadian makers, as well as grab and go meals from local restaurants and caterers. Local foods. Imported foods. Hot counters. Groceries. Fresh-made bespoke pizza. Butcher, cheese, fishmonger, and pastry counters. A deli that will create the sandwich of your dreams. It’s a place where I run into old friends and make new ones. Where listeners tap me on the shoulder after hearing me ask for half a wodge of cheese. It’s a favourite place.

Vincenzo’s 150 Caroline St S, Waterloo,

#BuyLocal #Canada #SMB #WaterlooRegion #WellingtonCounty #GuelphFoodies #Waterloofoodies #kitchenerfoodies #CambridgeFoodies #KitchenerWaterlooFoodies #IndependentGrocers #SpecialtyFoodStores #ExploreWaterlooRegion #Food #Mastonom

An open sourcxe AI traiing dataset lheld 12,000+ API keys & passwords! New research from Truffle Security uncovered nearly 12,000 valid API keys and passwords embedded in AI training datasets from Common Crawl—a widely used open-source web archive. These leaked secrets include AWS root keys, MailChimp API keys, and Slack webhooks, which can expose companies to data breaches, phishing, and supply chain risks.

As AI adoption grows, organizations must secure their code, scan for exposed credentials, and enforce strict key management policies to prevent unauthorized access and data leaks.

Read more details: ow.ly/Esop50V9vPT

#Cybersecurity #AISecurity #GenAI #AI #Databreach #APIsecurity #Infosec #RiskManagement #CISO #Cyberaware #SMB #CEOet/

BleepingComputer · Nearly 12,000 API keys and passwords found in AI training datasetBy Ionut Ilascu
Day 26 of 30 Days of Local Food: Nith Valley Apiaries

When I read about the adulteration of those convenient, cheap, (and sometimes cute) bottles of honey, I switched to locally-produced sweet stuff. When I’m not gifted with a jar from a friend’s hives, I turn to Nith Valley. Part of the local sustainable food system they’ve been around since 1918 and now have hives dotting the swath of territory including Perth and Oxford Counties and Waterloo Region. I prefer their unpasteurised liquid honey, but I cannot turn down their strawberry creamed (mixed with butter and sprinkled with salt and black pepper, on toasted seedy bread).

The pic: A 1kg jar of Nith Valley’s unpasteurised, unfiltered summer blossom honey.

Nith Valley Apiaries: 1041 Christner Rd, New Hamburg

#BuyLocal #Canada #SMB #WaterlooRegion #WellingtonCounty #GuelphFoodies #Waterloofoodies #kitchenerfoodies #CambridgeFoodies #KitchenerWaterlooFoodies #CanadianFood #Honey #Bees #ExploreWaterlooRegion #Food #Mastonom
Day 25 of 30 Days of Local Food: The Neighbourhood Group of Restaurants

I spent seven years as a restaurant reviewer, focussing on the experience (the ambiance, service, food). But, in reality, it’s never just about the dining experience (much to the chagrin of those seeking simplistic yums, regressive views of “worthy” food, it-spots, and petulant slams). I think it’s also about the impact on workers, producers, and communities. The Neighbourhood Group is a certified B-Corp, a designation where people are put before profits and sustainability isn't a causewashing catchphrase. And while some restaurants (and chefs) see “local food” as an excuse to bolster inaccessibility, at the Neighbourhood Group, it's about tasty and creative dishes without lofty prices or snooty attitudes.

Restaurants:
Borealis Kitchener : 4336 King Street East, Kitchener
Borealis Guelph : 1388 Gordon St, Guelph
Miijidaa :37 Quebec St, Guelph
Park Eatery : 294 Woolwich Street, Guelph
The Wooly Pub : 176 Woolwich Street, Guelph

#BuyLocal #Canada #SMB #WaterlooRegion #WellingtonCounty #GuelphFoodies #Waterloofoodies #kitchenerfoodies #CambridgeFoodies #KitchenerWaterlooFoodies #CanadianFood #Restaurants #BCorp #ExploreWaterlooRegion #Food #Mastonom