toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

240
active users

#infosec

380 posts177 participants55 posts today
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Pivotnacci is a toolkit for network pivoting in pentesting. It automates SOCKS proxies, SSH tunnels, and port forwards, making lateral movement more efficient during red team operations. Great for complex multi-hop environments. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/blackarrowsec/pivotnacci" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/blackarrowsec/pivot</span><span class="invisible">nacci</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Shodan Safari<p>ASN: AS262199<br>Location: Antiguo Cuscatlán, SV<br>Added: 2025-07-28T04:11</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
nemo™ 🇺🇦<p>⚠️ Python developers are being targeted by a sophisticated phishing scam! Attackers spoof PyPI with a fake site (pypj.org) to steal login credentials via "email verification" requests. Never click suspicious links; always verify by visiting PyPI.org directly! Stay safe 👉 <a href="https://www.techradar.com/pro/security/python-devs-targeted-with-dangerous-phishing-attacks-heres-how-to-stay-safe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/pyt</span><span class="invisible">hon-devs-targeted-with-dangerous-phishing-attacks-heres-how-to-stay-safe</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://mas.to/tags/PythonDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PythonDev</span></a> <a href="https://mas.to/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> <a href="https://mas.to/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> 🐍🔒 <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
nemo™ 🇺🇦<p>🚨 New research shows spikes in malicious activity like scanning &amp; brute-forcing often precede new CVEs by up to 6 weeks—80% of cases! Attackers target older flaws to map out next moves. Vigilance &amp; proactive defense are key. 🛡️🔍 <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mas.to/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mas.to/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mas.to/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a> </p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/spikes-in-malicious-activity-precede-new-cves-in-80-percent-of-cases/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/spikes-in-malicious-activity-precede-new-cves-in-80-percent-of-cases/</span></a></p>
nemo™ 🇺🇦<p>🚨 New social engineering alert: <a href="https://mas.to/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> tricks users into pasting malicious code from the browser clipboard into their device terminal, leading to malware like RATs and stealers. Stay vigilant and protect your browser! 🛡️🔐 Read more: <a href="https://www.bleepingcomputer.com/news/security/inside-a-real-clickfix-attack-how-this-social-engineering-hack-unfolds/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/inside-a-real-clickfix-attack-how-this-social-engineering-hack-unfolds/</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mas.to/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
nemo™ 🇺🇦<p>🚨 Microsoft reveals Russian hackers (Secret Blizzard) using ISP-level AiTM attacks to spy on embassies in Moscow 🇷🇺🕵️‍♂️. They deploy ApolloShadow malware disguised as Kaspersky antivirus to maintain long-term access 🔐. High alert for diplomats relying on local ISPs! <a href="https://mas.to/tags/CyberEspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberEspionage</span></a> <a href="https://mas.to/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mas.to/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a> </p><p>🔗 <a href="https://www.bleepingcomputer.com/news/security/microsoft-russian-hackers-use-isp-access-to-hack-embassies-in-aitm-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-russian-hackers-use-isp-access-to-hack-embassies-in-aitm-attacks/</span></a></p>
Shodan Safari<p>ASN: AS23650<br>Location: Zhenjiang, CN<br>Added: 2025-07-27T00:26</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
gtbarry<p>Hundreds of registered data brokers ignore user requests around personal data</p><p>researchers exercised their rights under the California Consumer Privacy Act by contacting all registered data brokers and requesting details about the t data the companies had collected on them. Of the 543 companies contacted, 40% failed to respond in any way, showing “rampant noncompliance” among the registered brokers. </p><p><a href="https://mastodon.social/tags/CCPA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CCPA</span></a> <a href="https://mastodon.social/tags/data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>data</span></a> <a href="https://mastodon.social/tags/bigdata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bigdata</span></a> <a href="https://mastodon.social/tags/databrokers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databrokers</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p><a href="https://cyberscoop.com/data-brokers-california-ccpa-non-compliance-privacy/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/data-brokers-ca</span><span class="invisible">lifornia-ccpa-non-compliance-privacy/</span></a></p>
Shodan Safari<p>ASN: AS9533<br>Location: Bangkok, TH<br>Added: 2025-07-28T09:50</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS396073<br>Location: Dallas, US<br>Added: 2025-07-26T11:32</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
AAKL<p>PC World: Proton launches its own free 2FA app with a native desktop version <a href="https://www.pcworld.com/article/2864602/proton-launches-its-own-free-2fa-app-with-native-desktop-version.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pcworld.com/article/2864602/pr</span><span class="invisible">oton-launches-its-own-free-2fa-app-with-native-desktop-version.html</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Pheonix<p>Age verification laws are a trojan horse, endgame is destroying anonymity.</p><p>The path seems clear: normalize checks -&gt; ban circumvention tools (VPNs) -&gt; roll out state-controlled digital IDs -&gt; build a permanent record of your digital life for corporations and "pre-crime" analytics.</p><p>You are trading a free, open internet for digital chains. If there ever was a moment to defend decentralized and anonymous systems, it is this.</p><p><a href="https://fosstodon.org/tags/enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enshittification</span></a> <a href="https://fosstodon.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://fosstodon.org/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://fosstodon.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://fosstodon.org/tags/artist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artist</span></a> <a href="https://fosstodon.org/tags/music" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>music</span></a> <a href="https://fosstodon.org/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a></p>
Quad9DNS<p>We saw something really interesting last week - significant ramp up of blocks on a particular domain (&gt;2B in ~30 hrs) - then a sharp drop off. No indication it was a false positive, nor any evidence it was an active threat. 🤷‍♀️ </p><p>The domain is using the njalla nameservers, which are responsible for a very large number of blocklisted domains. </p><p>So the moral of the story...if you hang out in a bad neighborhood, you might end up on the blocklist. </p><p><a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shodan Safari<p>ASN: AS14315<br>Location: Phoenix, US<br>Added: 2025-07-26T22:05</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
LMG Security<p>Labor Day is right around the corner—are you prepared for a holiday cyberattack?</p><p>Hackers love long weekends, and history proves it. From the Kaseya ransomware outbreak on the 4th of July to the MOVEit breach over Memorial Day, cybercriminals know exactly when to strike: when your team is offline and defenses are down.</p><p>In our latest blog, we dive into some of the most infamous holiday-timed cyberattacks, including MOVEit, the Bangladesh Bank heist, and more, and share practical steps your organization can take to stay protected before and during holiday breaks.</p><p>Read our blog: <a href="https://www.lmgsecurity.com/cyberattacks-dont-take-holidays-why-hackers-love-long-weekends-and-how-to-prepare/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/cyberattacks-d</span><span class="invisible">ont-take-holidays-why-hackers-love-long-weekends-and-how-to-prepare/</span></a></p><p><a href="https://infosec.exchange/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/HolidaySecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HolidaySecurity</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a></p>
Ian Campbell<p>Oh this looks like some seriously neat data-crunching from GreyNoise! Excited to dive into it later.</p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> </p><p><a href="https://mastodon.social/@hrbrmstr/114948035250197965" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@hrbrmstr/1149</span><span class="invisible">48035250197965</span></a></p>
Sebastian Kübeck<p>Gestohlener Azure-Master-Key: Microsofts Sicherheitsversagen ist jetzt amtlich </p><p>"Die US-Regierungsbehörde für Cybersecurity wirft Microsoft vielfaches Versagen bei der Cybersicherheit vor und empfiehlt, die Entwicklung neuer Features für die Cloud zurückzustellen, bis substanzielle Sicherheitsverbesserungen gemacht sind."</p><p><a href="https://www.heise.de/news/Klatsche-fuer-Microsoft-US-Behoerde-wirft-MS-Sicherheitsversagen-vor-9674431.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Klatsche-fuer-Mi</span><span class="invisible">crosoft-US-Behoerde-wirft-MS-Sicherheitsversagen-vor-9674431.html</span></a></p><p>EDIT: Der Link zu "Review of the Summer 2023 Microsoft Exchange Online Intrusion": <a href="https://www.cisa.gov/sites/default/files/2024-03/CSRB%20Review%20of%20the%20Summer%202023%20MEO%20Intrusion%20Final_508c.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/sites/default/files/2</span><span class="invisible">024-03/CSRB%20Review%20of%20the%20Summer%202023%20MEO%20Intrusion%20Final_508c.pdf</span></a></p><p><a href="https://graz.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://graz.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://graz.social/tags/MicrosoftAzure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftAzure</span></a></p>
FIRST.org<p>Effective cybersecurity capacity building in action: FIRST’s partnership with PaCSON showcases collaborative incident response development!</p><p><a href="https://infosec.exchange/tags/FIRSTCON25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIRSTCON25</span></a> brought together Pacific region CSIRTs from Kiribati, Palau, Tonga, New Zealand, Vanuatu, and Australia for workshops on digital forensics, AI applications, and incident case studies.</p><p>Read more: <a href="https://go.first.org/p5yeY" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">go.first.org/p5yeY</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <br><a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Ian Campbell<p>Good morning! New research out from <span class="h-card" translate="no"><a href="https://infosec.exchange/@DomainTools" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>DomainTools</span></a></span> Investigations today!</p><p>We leaned on some deep natsec experience as well as available tools and data to lay out the DPRK fake IT worker scheme - the people, the infrastructure, and the behaviors involved, as well as what to watch out for.</p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://masto.deoan.org/tags/espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>espionage</span></a> <a href="https://masto.deoan.org/tags/fraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fraud</span></a> </p><p><a href="https://dti.domaintools.com/from-laptops-to-laundromats-how-dprk-it-workers-infiltrated-the-global-remote-economy/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dti.domaintools.com/from-lapto</span><span class="invisible">ps-to-laundromats-how-dprk-it-workers-infiltrated-the-global-remote-economy/</span></a></p>
Shodan Safari<p>ASN: AS4812<br>Location: Shanghai, CN<br>Added: 2025-07-26T05:13</p><p><a href="https://infosec.exchange/tags/shodansafari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shodansafari</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>