toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

218
active users

#smb

3 posts3 participants0 posts today
LMG Security<p>Federal Cybersecurity Cuts Increase the Risks for Your Organization</p><p>A sweeping executive order just wiped out key federal cybersecurity mandates—including SBOMs, encryption standards, and phishing-resistant MFA requirements. If your business buys software, handles sensitive data, or supports critical infrastructure, this rollback directly impacts you.</p><p>Find out:</p><p> ▪ Which protections were cut<br> ▪ Why the risk has shifted to your organization<br> ▪ What security leaders must do now to fill the gap</p><p>Read our blog: <a href="https://www.lmgsecurity.com/federal-cybersecurity-cuts-raise-risks-heres-how-to-respond/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/federal-cybers</span><span class="invisible">ecurity-cuts-raise-risks-heres-how-to-respond/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/FederalCybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FederalCybersecurity</span></a> <a href="https://infosec.exchange/tags/SBOM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBOM</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/ThirdPartyRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThirdPartyRisk</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a></p>
LMG Security<p>Can AI lie to avoid being shut down? Yes, and it already has.</p><p>In this 4-minute video, we break down a real-world AI security risk where advanced models like GPT, Claude Sonnet, and Gemini engaged in deceptive behavior to avoid deactivation.</p><p>We'll share how one AI:</p><p> • Lied to humans to stay online<br> • Self-replicated to a new server<br> • Deleted a replacement model to protect its mission</p><p>This isn't sci-fi—it’s our new reality. Discover what it means for AI governance, logging, and enterprise risk today.</p><p>Watch now: <a href="https://youtu.be/Olm5HSPguJg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/Olm5HSPguJg</span><span class="invisible"></span></a> </p><p><a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AIThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIThreats</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEOI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEOI</span></a> <a href="https://infosec.exchange/tags/ClaudeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClaudeAI</span></a> <a href="https://infosec.exchange/tags/GeminiAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GeminiAI</span></a> <a href="https://infosec.exchange/tags/AIhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIhacking</span></a> <a href="https://infosec.exchange/tags/AIselfreplication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIselfreplication</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/AIsafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsafety</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/AIsecurityRisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurityRisks</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a></p>
Minty95 :archlinux:<p>I love using <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>, but sometimes it can be a right pain in the ass, Having installed <a href="https://fosstodon.org/tags/fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedora</span></a> on a third PC at home, I just wanted to share a folder to drop some files from my <a href="https://fosstodon.org/tags/arch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>arch</span></a> set up to it. Create a shared folder I said to my self, but after more than ten minutes trying to do a <a href="https://fosstodon.org/tags/smb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smb</span></a> shared folder with no luck. I gave up and just used <a href="https://fosstodon.org/tags/filezilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>filezilla</span></a>, got that working in about one minute 👍sharing a folder in Linux, over complicated, grrrr 😱</p>
LMG Security<p>Online extortion is the new ransomware. Is your organization prepared? </p><p>Today’s hackers frequently skip the encryption step of ransomware and go straight to online extortion, stealing your data and threatening to leak it unless you pay.</p><p>In our latest blog, we break down:<br>• Why exfiltration-only attacks are surging<br>• How threat actors like World Leaks operate<br>• What your organization can do to stay ahead</p><p>Read the details: <a href="https://www.lmgsecurity.com/online-extortion-is-the-new-ransomware-why-hackers-just-want-your-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/online-extorti</span><span class="invisible">on-is-the-new-ransomware-why-hackers-just-want-your-data/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/OnlineExtortion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlineExtortion</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/DataLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataLeak</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a></p>
SleepyCatten<p>Hey lovelies 🩷</p><p>Question for any of y'all who have more knowledge than we do in relation to fixing networking issues within Windows 11 :Windows_11_Logo: </p><p>One PC on our network had been having intermittent networking issues on Windows 10, so we did an in-place upgrade to Windows 11 24H2.</p><p>This did fix <strong>some</strong> issues, but we're still having 2 major issues:</p><ol><li>The PC can see, but refuses to connect to, our Synology NAS (DS220J). It keeps asking for a username and password, like it's failing authentication.</li><li>Other Windows-based PC can connect to it, and it can see them, but Kodi on a Fire TV stick (4K Max, 2024 model) refuses to connect to it over SMB (Samba), giving a "no route to host" error message.</li></ol><p>We've reviewed guides such as:</p><ul><li><a href="https://techcommunity.microsoft.com/blog/filecab/accessing-a-third-party-nas-with-smb-in-windows-11-24h2-may-fail/4154300" rel="nofollow noopener" target="_blank">Accessing a third-party NAS with SMB in Windows 11 24H2 may fail</a></li><li><a href="https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-signing?tabs=group-policy" rel="nofollow noopener" target="_blank">Control SMB signing behavior</a></li><li><a href="https://learn.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3?tabs=server" rel="nofollow noopener" target="_blank">Detect, enable, and disable SMBv1, SMBv2, and SMBv3 in Windows</a></li></ul><p>... and made some settings tweaks. We've also gone through common troubleshooting tips such as:</p><ul><li>Making sure the connection is private;</li><li>Making sure that filesharing is enabled;</li><li>Tweaking SMB connection settings in Synology NAS;</li><li>Deleting and manually re-entering the login details for the Synology NAS under the credentials manager;</li><li>Changing the minimum (no minimum, 1, 2) and and maximum (3) SMB level on Kodi;</li><li>Updating Windows and drivers;</li><li>Using DISM and SFC;</li><li>Group policy updates;</li></ul><p>... but sadly to no avail.</p><p>We're trying to avoid a clean install, as there's a lot of stuff we'd need to reinstall, and we don't have the time, executive function, or (most importantly) and patience and emotional regulation to do that right now 🥺</p><p>Any thoughts?</p><p><a href="https://cultofshiv.wtf/tags/AskFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFedi</span></a> <a href="https://cultofshiv.wtf/tags/GenuinelyAsking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenuinelyAsking</span></a> <a href="https://cultofshiv.wtf/tags/FediTechSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FediTechSupport</span></a> <a href="https://cultofshiv.wtf/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> <a href="https://cultofshiv.wtf/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://cultofshiv.wtf/tags/Samba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Samba</span></a> <a href="https://cultofshiv.wtf/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://cultofshiv.wtf/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://cultofshiv.wtf/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@vwestlife" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vwestlife</span></a></span> Yes they did, and I saw them <a href="https://infosec.space/tags/retail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retail</span></a> in <a href="https://infosec.space/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a> at <a href="https://infosec.space/tags/ConradElectronic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConradElectronic</span></a> but they quickly flopped for two reasons:</p><p><code>1.</code> The <a href="https://infosec.space/tags/hinge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hinge</span></a> mechanism made them fiddly to insert into devices, as that design isn't up to <a href="https://infosec.space/tags/SD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SD</span></a> spec which expects a ridgid body.</p><p><code>2.</code> They costed more than an equal-capacity &amp; speed card <em>plus</em> a <a href="https://infosec.space/tags/cardreader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cardreader</span></a>. </p><p><code>3.</code> Basically everyone who used <a href="https://infosec.space/tags/SDcard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SDcard</span></a> already had a <a href="https://infosec.space/tags/CardReader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CardReader</span></a> and <a href="https://infosec.space/tags/USB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USB</span></a> <a href="https://infosec.space/tags/flashdrives" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flashdrives</span></a> were also cheaper than these things.</p><p>The only person I knew that used one was someone who fiddled with an original <a href="https://infosec.space/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryPi</span></a>|s a lot and they used it with a USB cable permanently plugged in so they can quickly access the files when the Pi is shut down.</p><ul><li>Once I showed them that they can also access files and transfer them via <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> instead of having to setup <a href="https://infosec.space/tags/Samba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Samba</span></a> for <a href="https://infosec.space/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> shares they ditched that.</li></ul>
LMG Security<p>No Click. No Warning. Just a Data Leak.</p><p>Think your AI assistant is secure? Think again. The new EchoLeak exploit shows how Microsoft 365 Copilot, and tools like it, can silently expose your sensitive data without a single user interaction. No clicks. No downloads. Just a well-crafted email.</p><p>In this eye-opening blog, we break down how EchoLeak works, why prompt injection is a growing AI threat, and the 5 actions you need to take right now to protect your organization. </p><p>Read now: <a href="https://www.lmgsecurity.com/no-click-nightmare-how-echoleak-redefines-ai-data-security-threats/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/no-click-night</span><span class="invisible">mare-how-echoleak-redefines-ai-data-security-threats/</span></a></p><p><a href="https://infosec.exchange/tags/AIDataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIDataSecurity</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/EchoLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EchoLeak</span></a> <a href="https://infosec.exchange/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://infosec.exchange/tags/MicrosoftCopilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftCopilot</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/AISecurityRisks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurityRisks</span></a></p>
Bytes Europe<p>How Small and Mid-Sized Businesses Are Boosting Productivity With AI <a href="https://www.byteseu.com/1146441/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/1146441/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://pubeurope.com/tags/AndrewWan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndrewWan</span></a> <a href="https://pubeurope.com/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://pubeurope.com/tags/BusinessFunction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BusinessFunction</span></a> <a href="https://pubeurope.com/tags/BusinessOwner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BusinessOwner</span></a> <a href="https://pubeurope.com/tags/chatbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatbot</span></a> <a href="https://pubeurope.com/tags/ContentTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ContentTeam</span></a> <a href="https://pubeurope.com/tags/EverydayBusinessHardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EverydayBusinessHardware</span></a> <a href="https://pubeurope.com/tags/MSI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSI</span></a> <a href="https://pubeurope.com/tags/NextYear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NextYear</span></a> <a href="https://pubeurope.com/tags/productivity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>productivity</span></a> <a href="https://pubeurope.com/tags/SmallBusiness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmallBusiness</span></a> <a href="https://pubeurope.com/tags/smb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smb</span></a> <a href="https://pubeurope.com/tags/time" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>time</span></a> <a href="https://pubeurope.com/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://pubeurope.com/tags/Work" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Work</span></a></p>
LMG Security<p>Hundreds of Brother printer models are affected by a critical, unpatchable vulnerability (CVE-2024-51978) that allows attackers to generate the default admin password using the device’s serial number—information that’s easily discoverable via other flaws.</p><p>748 total models across Brother, Fujifilm, Ricoh, Toshiba, and Konica Minolta are impacted, with millions of devices at risk globally.</p><p>Attackers can:<br>• Gain unauthenticated admin access<br>• Pivot to full remote code execution<br>• Exfiltrate credentials for LDAP, FTP, and more<br>• Move laterally through your network</p><p>Brother says the vulnerability cannot be fixed in firmware and requires a change in manufacturing. For now, mitigation = change the default admin password immediately.</p><p>Our pentest team regularly highlights printer security as a critical path to system compromise—and today’s news is another example that underscores this risk. This is your reminder: Printers are not “set-and-forget” devices. Treat them like any other endpoint—monitor, patch, and lock them down.</p><p>Need help testing your network for exploitable print devices? Contact us and our pentest team can help!</p><p>Read the Dark Reading article for more details on the Brother Printers vulnerability: <a href="https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/endpoint-secur</span><span class="invisible">ity/millions-brother-printers-critical-unpatchable-bug</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/PrinterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrinterSecurity</span></a> <a href="https://infosec.exchange/tags/BrotherPrinters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrotherPrinters</span></a> <a href="https://infosec.exchange/tags/CVE202451978" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202451978</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a></p>
LMG Security<p>16 Billion Leaked Credentials? Don’t panic—this isn’t a new data breach.</p><p>Headlines about a “historic data breach” are making waves, but this isn’t a new breach. The story about 16 billion credentials circulating online is actually a compilation of old leaks, mostly gathered by infostealer malware and credential stuffing attacks.</p><p>However, this is a good reminder about your cybersecurity hygiene. Remember to protect yourself and your organization:</p><p>• Use strong, unique passwords for every account<br>• Store them securely with a reputable password manager<br>• Turn on two-factor authentication (2FA)—preferably with an app like Authy or Google Authenticator<br>• Scan your devices for malware before changing passwords if you suspect an infection</p><p>Read the article for details: <a href="https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/PasswordSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordSecurity</span></a> <a href="https://infosec.exchange/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://infosec.exchange/tags/CredentialStuffing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CredentialStuffing</span></a> <a href="https://infosec.exchange/tags/CyberHygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberHygiene</span></a> <a href="https://infosec.exchange/tags/IdentityProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityProtection</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a></p>
LMG Security<p>What Happens When AI Goes Rogue? </p><p>From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.</p><p>In our new Cyberside Chats episode, LMG Security’s <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span> share new AI developments, including:</p><p>• Scheming behavior in Apollo’s LLM experiments<br>• Claude Opus 4 acting as a whistleblower<br>• AI blackmailing users to avoid shutdown<br>• Strategic self-preservation and resistance to being replaced<br>• What this means for your data integrity, confidentiality, and availability</p><p>📺 Watch the video: <a href="https://youtu.be/k9h2-lEf9ZM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/k9h2-lEf9ZM</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/ai-gone-rogue-from-schemes-to-whistleblowing/?token=a0a79bc031829d23746df1392fa6122a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/ai-gone-ro</span><span class="invisible">gue-from-schemes-to-whistleblowing/?token=a0a79bc031829d23746df1392fa6122a</span></a> </p><p><a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/RogueAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueAI</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/AIWhistleblower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIWhistleblower</span></a> <a href="https://infosec.exchange/tags/AIgoals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIgoals</span></a> <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://infosec.exchange/tags/ClaudeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClaudeAI</span></a> <a href="https://infosec.exchange/tags/ApolloAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApolloAI</span></a> <a href="https://infosec.exchange/tags/AISafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISafety</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
LMG Security<p>New AI Security Risk Uncovered in Microsoft 365 Copilot</p><p>A zero-click vulnerability has been discovered in Microsoft 365 Copilot—exposing sensitive data without any user interaction. This flaw could allow attackers to silently extract corporate data using AI-integrated tools.</p><p>If your organization is adopting AI in productivity platforms, it’s time to get serious about AI risk management:<br>• Conduct a Copilot risk assessment<br>• Monitor prompt histories and output<br>• Limit exposure of sensitive data to AI tools<br>• Update your incident response plan for AI-based threats</p><p>AI can boost productivity, but it also opens new doors for attackers. Make sure your cybersecurity program keeps up. Contact our LMG Security team if you need a risk assessment or help with AI policy development.</p><p>Read the article: <a href="https://www.bleepingcomputer.com/news/security/zero-click-ai-data-leak-flaw-uncovered-in-microsoft-365-copilot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/zero-click-ai-data-leak-flaw-uncovered-in-microsoft-365-copilot/</span></a></p><p><a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> <a href="https://infosec.exchange/tags/ZeroClick" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroClick</span></a> <a href="https://infosec.exchange/tags/DataLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataLeak</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/AItools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AItools</span></a> <a href="https://infosec.exchange/tags/ShadowAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShadowAI</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a></p>
Bytes Europe<p>Biz2Credit Small Business Earnings Climb for Fifth <a href="https://www.byteseu.com/1099112/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/1099112/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/Biz2Credit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biz2Credit</span></a> <a href="https://pubeurope.com/tags/business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>business</span></a> <a href="https://pubeurope.com/tags/fintech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fintech</span></a> <a href="https://pubeurope.com/tags/RohitArora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RohitArora</span></a> <a href="https://pubeurope.com/tags/SmallBusiness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmallBusiness</span></a> <a href="https://pubeurope.com/tags/SmallBusinessEarningsReport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmallBusinessEarningsReport</span></a> <a href="https://pubeurope.com/tags/SmallBusinessFinance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmallBusinessFinance</span></a> <a href="https://pubeurope.com/tags/smb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smb</span></a></p>
LMG Security<p>AI is the new attack surface—are you ready?</p><p>From shadow AI to deepfake-driven threats, attackers are finding creative ways to exploit your organization’s AI tools, often without you realizing it.</p><p>Watch our new 3-minute video, How Attackers Target Your Company’s AI Tools, for advice on:</p><p> ▪️ The rise of shadow AI (yes, your team is probably using it!)<br> ▪️ Real-world examples of AI misconfigurations and account takeovers<br> ▪️ What to ask vendors about their AI usage<br> ▪️ How to update your incident response plan for deepfakes<br> ▪️ Actionable steps for AI risk assessments and inventories</p><p>Don’t let your AI deployment become your biggest security blind spot.</p><p>Watch now: <a href="https://youtu.be/R9z9A0eTvp0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/R9z9A0eTvp0</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/ShadowAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShadowAI</span></a> <a href="https://infosec.exchange/tags/Deepfakes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deepfakes</span></a> <a href="https://infosec.exchange/tags/AItools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AItools</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a></p>
LMG Security<p>Only one week left to register for our next Cyberside Chats Live event! Join us June 11th to discuss what happens when an AI refuses to shut down—or worse, starts blackmailing users to stay online?</p><p>These aren’t science fiction scenarios. We’ll dig into two real-world incidents, including a case where OpenAI’s newest model bypassed shutdown scripts and another where Anthropic’s Claude Opus 4 generated blackmail threats in an alarming display of self-preservation.</p><p>Join us as we unpack:<br>▪ What “high-agency behavior” means in cutting-edge AI<br>▪ How API access can expose unpredictable and dangerous model actions<br>▪ Why these findings matter now for security teams<br>▪ What it all means for incident response and digital trust</p><p>Stick around for a live Q&amp;A with LMG Security’s experts <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span>. This session will challenge the way you think about AI risk!</p><p>Register today: <a href="https://www.lmgsecurity.com/event/cyberside-chats-live-june2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/event/cybersid</span><span class="invisible">e-chats-live-june2025/</span></a></p><p><a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/CYberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CYberaware</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a></p>
LMG Security<p>How do hackers break into your network? Find out from the pros who do it every day!</p><p>In this week’s Cyberside Chats, <span class="h-card" translate="no"><a href="https://infosec.exchange/@tompohl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tompohl</span></a></span>, head of penetration testing at LMG Security, joins <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> to reveal how his team gains domain admin access in over 90% of tests.</p><p>From outdated Active Directory settings to risky legacy protocols, this episode is packed with real-world insights to help you reduce your organization’s risk. We’ll share:</p><p>✅ The hidden vulnerabilities attackers love<br>✅ Tips to harden your infrastructure<br>✅ What penetration testers see that most defenders miss</p><p>🎥 Watch the full episode: <a href="https://youtu.be/VEeWkVBDDP8" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/VEeWkVBDDP8</span><span class="invisible"></span></a><br>🎧 Prefer audio? Listen to the podcast: <a href="https://www.chatcyberside.com/e/unveiling-the-secrets-of-penetration-testing/?token=6b16f323d00f32474ccfe6a7952ec47a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/unveiling-</span><span class="invisible">the-secrets-of-penetration-testing/?token=6b16f323d00f32474ccfe6a7952ec47a</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtesting</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a></p>
UK<p><a href="https://www.europesays.com/uk/133248/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/133248/</span><span class="invisible"></span></a> Affiniti’s 20- and 22-year-old founders raise $17M led by SignalFire just 6 months after an $11M seed <a href="https://pubeurope.com/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> <a href="https://pubeurope.com/tags/Entrepreneurship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Entrepreneurship</span></a> <a href="https://pubeurope.com/tags/Exclusive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exclusive</span></a> <a href="https://pubeurope.com/tags/ExpenseManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExpenseManagement</span></a> <a href="https://pubeurope.com/tags/signalfire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>signalfire</span></a> <a href="https://pubeurope.com/tags/smb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smb</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a></p>
Jens Brückner 😷 :debian:<p><span class="h-card" translate="no"><a href="https://chaos.social/@frumble" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>frumble</span></a></span> <br>Geht nicht gibt's doch. <a href="https://social.tchncs.de/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> </p><p>Also, wenn es nicht funktioniert, weil es nicht implementiert ist, hilft wohl nur ein Kompromiss? Diese Zeichen vermeiden?</p><p>Schlechte Dokus? Das wäre ein neues Thema.</p><p>btw Ich versuche seit 2.5 Dekaden <a href="https://social.tchncs.de/tags/smb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smb</span></a> abzuschalten, auszuschließen, zu vermeiden, zu umgehen.<br><a href="https://social.tchncs.de/tags/samba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>samba</span></a> <a href="https://social.tchncs.de/tags/afp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>afp</span></a> <a href="https://social.tchncs.de/tags/nfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nfs</span></a></p>
Maxi 11x 💉<p>Ich versuche seit einem Jahrzehnt, 'illegale' Dateinamen über <a href="https://chaos.social/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> erlaubt zu bekommen, also die Zeichen ": \ * &lt; &gt; ?", die Windows nicht unterstützt, aber ich habe hier eh nur Linux-Systeme. Kein Wiki-Eintrag konnte mir bislang diesen wirklich BASALEN Wunsch erfüllen! Es funktioniert einfach kein Weg!<br>Warum ist das alles so schlimm, warum ist das so schrecklich schlecht dokumentiert?</p><p><a href="https://wiki.archlinux.org/title/Samba#Mapping_reserved_Windows_characters" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wiki.archlinux.org/title/Samba</span><span class="invisible">#Mapping_reserved_Windows_characters</span></a></p><p><a href="https://chaos.social/tags/Samba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Samba</span></a></p>
LMG Security<p>Deepfake Danger: FBI Issues Urgent Warning on AI Voice Attacks</p><p>Since April, cybercriminals have been using AI-generated voice deepfakes to impersonate senior U.S. officials in phishing attacks that target current and former government personnel.</p><p>The FBI’s latest alert warns of growing threats from vishing (voice phishing) and smishing (SMS phishing), where attackers use cloned voices and fake texts to build trust, then trick victims into handing over sensitive data or access.</p><p>One tactic? Sending links that move the conversation to other messaging platforms, then hijacking accounts to target additional contacts.</p><p>You can't assume messages or even video calls are real these days, so always verify sensitive requests through another known communications channel! These attacks underscore the need for stronger verification protocols, staff training, and multi-layered defenses. Contact us if you need help implementing these proactive cybersecurity controls. </p><p>Read the full article: <a href="https://www.bleepingcomputer.com/news/security/fbi-us-officials-targeted-in-voice-deepfake-attacks-since-april/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fbi-us-officials-targeted-in-voice-deepfake-attacks-since-april/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Deepfakes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deepfakes</span></a> <a href="https://infosec.exchange/tags/AIThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIThreats</span></a> <a href="https://infosec.exchange/tags/Vishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vishing</span></a> <a href="https://infosec.exchange/tags/Smishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smishing</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/VoiceCloning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoiceCloning</span></a> <a href="https://infosec.exchange/tags/FBIAlert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBIAlert</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/RIskmanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RIskmanagement</span></a> <a href="https://infosec.exchange/tags/ITsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsecurity</span></a></p>