toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

227
active users

#Trellix

0 posts0 participants0 posts today
Pyrzout :vm:<p>LockBit panel data leak shows Chinese orgs among the most targeted <a href="https://www.helpnetsecurity.com/2025/06/12/lockbit-data-leak-targets-ransoms/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/12</span><span class="invisible">/lockbit-data-leak-targets-ransoms/</span></a> <a href="https://social.skynetcloud.site/tags/PositiveTechnologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PositiveTechnologies</span></a> <a href="https://social.skynetcloud.site/tags/manufacturingsector" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>manufacturingsector</span></a> <a href="https://social.skynetcloud.site/tags/RussianFederation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussianFederation</span></a> <a href="https://social.skynetcloud.site/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a> <a href="https://social.skynetcloud.site/tags/Taiwan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Taiwan</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a></p>
Pyrzout :vm:<p>CISOs call for operational threat intelligence integration <a href="https://www.helpnetsecurity.com/2025/06/12/cisos-operational-threat-intelligence/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/12</span><span class="invisible">/cisos-operational-threat-intelligence/</span></a> <a href="https://social.skynetcloud.site/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/strategy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>strategy</span></a> <a href="https://social.skynetcloud.site/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a> <a href="https://social.skynetcloud.site/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a></p>
Pyrzout :vm:<p>AI-based tools designed for criminal activity are in high demand <a href="https://www.helpnetsecurity.com/2024/11/29/ai-tools-ransomware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2024/11/29</span><span class="invisible">/ai-tools-ransomware/</span></a> <a href="https://social.skynetcloud.site/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://social.skynetcloud.site/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a> <a href="https://social.skynetcloud.site/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a> <a href="https://social.skynetcloud.site/tags/survey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>survey</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Pyrzout :vm:<p>Should the CISOs role be split into two functions? <a href="https://www.helpnetsecurity.com/2024/10/21/cisos-growing-responsibilities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2024/10/21</span><span class="invisible">/cisos-growing-responsibilities/</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/regulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regulation</span></a> <a href="https://social.skynetcloud.site/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a> <a href="https://social.skynetcloud.site/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a> <a href="https://social.skynetcloud.site/tags/survey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>survey</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a></p>
Scott Williams 🐧<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GossiTheDog</span></a></span> They're still around, but under a different name. <a href="https://mastodon.online/tags/McAfee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>McAfee</span></a> Enterprise is now <a href="https://mastodon.online/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a>. Trellix Endpoint Protection (EDR) is a similar product to the <a href="https://mastodon.online/tags/Crowdstrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crowdstrike</span></a> one that failed on Friday.</p><p><a href="https://www.trellix.com/products/edr/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">trellix.com/products/edr/</span><span class="invisible"></span></a></p>
Leo Bistmans<p><span class="h-card" translate="no"><a href="https://ioc.exchange/@percepticon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>percepticon</span></a></span> would be nice to read about those who not made the list and why...</p><p><a href="https://mastodon.online/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a>, <a href="https://mastodon.online/tags/checkpoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>checkpoint</span></a> , <a href="https://mastodon.online/tags/Mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mandiant</span></a> ...</p>
Patch NOW !!<p>CVE-2024-5671 (CVSS Base Score : 9.8) -&gt; Remote Code Execution in Trellix Intrusion Prevention System could lead to complete system compromise.</p><p>Advisory links:</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-5671" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/CVE-2</span><span class="invisible">024-5671</span></a></p><p><a href="https://thrive.trellix.com/s/article/000013623" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thrive.trellix.com/s/article/0</span><span class="invisible">00013623</span></a></p><p>Patch Link:</p><p><a href="https://docs.trellix.com/nl-NL/bundle/intrusion-prevention-system-11.1.x-manager-ns-series-release-notes/page/UUID-18de5423-4520-d400-f539-fc3184256955.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.trellix.com/nl-NL/bundle/</span><span class="invisible">intrusion-prevention-system-11.1.x-manager-ns-series-release-notes/page/UUID-18de5423-4520-d400-f539-fc3184256955.html</span></a></p><p><a href="https://infosec.exchange/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a></p><p><a href="https://infosec.exchange/tags/PatchNOW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNOW</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p><p><a href="https://infosec.exchange/tags/hacked" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacked</span></a></p><p><a href="https://infosec.exchange/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattack</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p><p><a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityAwareness</span></a></p><p><a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a></p><p><a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p><p><a href="https://infosec.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p><a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a></p>
Jonathan Kamens 86 47<p>One of the disadvantages of working for the government is your computer is burdened with resource-heavy security software which the vendor claims doesn't interfere with performance but that's almost always a lie.<br>I powered on and logged into my government laptop about three hours ago. Its CPU has been pegged at 100% for the past three hours. Thanks <a href="https://federate.social/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a>.<br><a href="https://federate.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Jonathan Kamens 86 47<p>I really enjoy the fact that my IT department reboots my laptop overnight on a regular basis, combined with the fact that it takes about ten minutes for my laptop to stop going crazy when I log in. It makes for so much productivity when I sit down at my desk in the morning, energized to start work!<br>(Yes, this is <a href="https://federate.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a>, of course, and yes, there's performance-intensive security software running in the background that makes launching apps excruciatingly slow and compute-intensive.)<br><a href="https://federate.social/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://federate.social/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a></p>
Dissent Doe :cupofcoffee:<p>Emsisoft's recent report advocating for a ban on <a href="https://infosec.exchange/tags/ransom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransom</span></a> payments has been generating discussion and debate -- and that's a good thing. </p><p>I came across some stats from the UK this morning which are also food for thought on this issue. </p><p>[ If you missed Emsisoft's report it's at <a href="https://www.emsisoft.com/en/blog/44987/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">emsisoft.com/en/blog/44987/the</span><span class="invisible">-state-of-ransomware-in-the-u-s-report-and-statistics-2023/</span></a> ]</p><p><a href="https://infosec.exchange/tags/ITPro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITPro</span></a> provides a summary from a Trellix report:</p><p>"One-third of UK-based <a href="https://infosec.exchange/tags/CISOs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISOs</span></a> have confessed to paying <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> groups millions of dollars in recent years in a bid to alleviate the impact of an attack, according to new research.</p><p>Analysis from security firm Trellix found four-in-ten UK CISOs have managed a ransomware attack in the last five years – and in every single case, their organization opted to pay.</p><p><a href="https://infosec.exchange/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a> found that one-third of CISOs paid between $5 million and $15 million for a ransom demand while 13% paid between $10 and $15 million.</p><p>The minimum ransom paid by all UK businesses across a five year period stood at around $250,000, the study found."</p><p>ITpro: <a href="https://www.itpro.com/security/ransomware/uk-cisos-are-cowing-to-ransomware-demands-more-than-you-think-heres-why-they-shouldnt-pay-up" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itpro.com/security/ransomware/</span><span class="invisible">uk-cisos-are-cowing-to-ransomware-demands-more-than-you-think-heres-why-they-shouldnt-pay-up</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@brett" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>brett</span></a></span></p>
Tarnkappe.info<p>📬 Apple Sicherheit auf dem Prüfstand: iOS &amp; macOS nicht besser als andere<br><a href="https://social.tchncs.de/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSicherheit</span></a> <a href="https://social.tchncs.de/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://social.tchncs.de/tags/DougMcKee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DougMcKee</span></a> <a href="https://social.tchncs.de/tags/ForcedEntry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForcedEntry</span></a> <a href="https://social.tchncs.de/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://social.tchncs.de/tags/iPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPhone</span></a> <a href="https://social.tchncs.de/tags/Macbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Macbook</span></a> <a href="https://social.tchncs.de/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://social.tchncs.de/tags/NSOGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSOGroup</span></a> <a href="https://social.tchncs.de/tags/Sandbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sandbox</span></a> <a href="https://social.tchncs.de/tags/Schwachstellen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schwachstellen</span></a> <a href="https://social.tchncs.de/tags/Trellix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trellix</span></a> <a href="https://social.tchncs.de/tags/WillStrafach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WillStrafach</span></a> <a href="https://tarnkappe.info/artikel/it-sicherheit/apple-sicherheit-auf-dem-pruefstand-ios-macos-nicht-besser-als-andere-265941.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tarnkappe.info/artikel/it-sich</span><span class="invisible">erheit/apple-sicherheit-auf-dem-pruefstand-ios-macos-nicht-besser-als-andere-265941.html</span></a></p>