toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

218
active users

#soc

1 post1 participant0 posts today
Bytes Europe<p>Are SOC Teams Ready For Geopolitical Cyber Threats? <a href="https://www.byteseu.com/1224220/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/1224220/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/CyberIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberIntelligence</span></a> <a href="https://pubeurope.com/tags/Cyberwarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberwarfare</span></a> <a href="https://pubeurope.com/tags/GeopoliticalCyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GeopoliticalCyberThreats</span></a> <a href="https://pubeurope.com/tags/Geopolitics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Geopolitics</span></a> <a href="https://pubeurope.com/tags/RobinDimyanoglu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RobinDimyanoglu</span></a> <a href="https://pubeurope.com/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a></p>

📢 Exciting Announcement! 📢

Join us tomorrow at 14:00 CET for the Kunai Workshop Virtual Summer School (VSS) organized by CIRCL! 🌟

🔍 What You'll Learn:
- The basics of Kunai
- Using Kunai tools (github.com/kunai-project/pykun)
- Configuring Kunai with MISP IoCs
- Building advanced log filtering and detection rules
- How to use Kunai and Yara

📝 Program and Prerequisites:
Make sure to check out the program and complete the prerequisites before joining: github.com/kunai-project/works

🌐 How to Join VSS: circl.lu/pub/vss-2025/

🎓 Don't miss this opportunity to enhance your skills with Kunai! See you there! 🚀

GitHubGitHub - kunai-project/pykunai: Repository of helper tools for KunaiRepository of helper tools for Kunai. Contribute to kunai-project/pykunai development by creating an account on GitHub.
Replied in thread

@cleverboi @FandaSin @BrodieOnLinux @neal as for #i386 I understood why cuz it was more and more painful m, but the problem with #i486 is that in several #embedded and #industrial setups there are still newly deloyed systems based off it.

I.e. #Vortex86 #SoC's cuz #MSDOS and shit still gets used in #industrial equipment.

  • And #Linux is kinda necessary to keep that rollin'...

Linux stopped supporting i386 with versions 3.4.99 (longterm) & 3.6.9 respectably.

  • And unlike with i386 where none of the toolchain (#musl) and utilities (#toybox) supoort it, i486 is still supported there.

And I really want to continue developing a minimalist "rescue" distro that can handle such legacy hardware because it may be the only option to ddrescue stuff from certain systems or to properly & reproduceably backup & restore them!

GitHubOS1337/docu/linux.kernel.versions.tsv at main · OS-1337/OS1337OS/1337 Project . Contribute to OS-1337/OS1337 development by creating an account on GitHub.

🚀 Kunai Sandbox is now live! 🚀

Curious about Kunai? Want to analyze Linux malware logs? Or share malware analysis to build detection rules? Kunai Sandbox has you covered! 🛡️

🔍 Check out what Kunai can do:
✅ Explore Kunai's log structure without running it locally
✅ Analyze logs generated by Linux malware
✅ Share malware analysis with others to build detection rules

🔗 See an example analysis of the perfctl #linux #malware: sandbox.kunai.rocks/analysis/5

🚀 New Blog Post: Kunai vs io_uring (why.kunai.rocks/blog/kunai-vs-) 🚀

💡 Ever wondered how io_uring revolutionizes I/O operations in the Linux kernel? Inspired by Armo's blog post (armosec.io/blog/io_uring-rootk) about a PoC rootkit using io_uring, we explored this feature's security implications and how tools like Kunai can monitor these operations.

🔍 Key Takeaways:
🔹 io_uring boosts I/O performance by reducing system call overhead and enabling asynchronous operations
🔹 Security tools struggle to monitor io_uring due to its unique handling of operations
🔹 Kunai now provides visibility into io_uring operations, though blocking malicious activities remains challenging
🔹 Recent kernel versions have introduced auditing and security controls for io_uring, but these are still limited

📖 Read more: why.kunai.rocks/blog/kunai-vs-

why.kunai.rocks · Kunai vs io_uring | KunaiIntroduction