est.social on üks paljudest sõltumatutest Mastodoni serveritest, mida saab fediversumis osalemiseks kasutada.
est.social on mõeldud Eestis üldkasutatavaks Mastodoni serveriks. est.social is meant to be a general use Mastodon server for Estonia.

Administraator:

Serveri statistika:

90
aktiivsed kasutajad

#securityresearch

1 postitusega1 osalejaga0 postitust täna
G :donor: :Tick:<p>This is kinda cool - my <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/VaultRecon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VaultRecon</span></a> vulnerability (that <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> say is by design and is not a vulnerability) is now listed in the <a href="https://infosec.exchange/tags/CloudVulnDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudVulnDB</span></a> 🤩 <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> —<a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/KeyVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyVault</span></a> <a href="https://infosec.exchange/tags/Enumeration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Enumeration</span></a> <a href="https://infosec.exchange/tags/SharingIsSecuring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharingIsSecuring</span></a> <a href="https://infosec.exchange/tags/WeAllWinTogether" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WeAllWinTogether</span></a> 🤘🏻💪🏻</p><p><a href="https://www.cloudvulndb.org/azure-vault-recon-keyvault-secret-metadata-control-plane-exfiltration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cloudvulndb.org/azure-vault-re</span><span class="invisible">con-keyvault-secret-metadata-control-plane-exfiltration</span></a></p>
G :donor: :Tick:<p>I iz in ur logicappz, stealin ur secretz <a href="https://infosec.exchange/tags/SilentReaper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SilentReaper</span></a> <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/VulnNotVuln" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnNotVuln</span></a> <a href="https://infosec.exchange/tags/DataExfiltration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataExfiltration</span></a> <a href="https://infosec.exchange/tags/CredentialTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CredentialTheft</span></a> <a href="https://infosec.exchange/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p><p>Blog: <a href="https://cirriustech.co.uk/blog/azure-silent-reaper/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cirriustech.co.uk/blog/azure-s</span><span class="invisible">ilent-reaper/</span></a><br>Tools: <a href="https://github.com/Az-Skywalker/Az-Skywalker" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Az-Skywalker/Az-Sky</span><span class="invisible">walker</span></a></p>
Christoffer S.<p>Johann Rehberge - ChatGPT Operator: Prompt Injection Exploits &amp; Defenses <a href="https://embracethered.com/blog/posts/2025/chatgpt-operator-prompt-injection-exploits/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">embracethered.com/blog/posts/2</span><span class="invisible">025/chatgpt-operator-prompt-injection-exploits/</span></a></p><p>Johann explores vulnerabilities of the ChatGPT Operator, a web-enabled agent from OpenAI, focusing on prompt injection exploits and the associated risks. Categorizes risks into three areas: user misalignment, model misalignment, and website misalignment.</p><p>We need research like this!</p><p><a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://swecyb.com/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> <a href="https://swecyb.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://swecyb.com/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a></p>
Christoffer S.<p>Joshua Rogers <a href="https://joshua.hu/proxy-pass-nginx-decoding-normalizing-url-path-dangerous" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">joshua.hu/proxy-pass-nginx-dec</span><span class="invisible">oding-normalizing-url-path-dangerous</span></a></p><p>Joshua explores vulnerabilities/weaknesses related to how web servers, particularly nginx (through proxy_pass), handle URL normalization and path traversal. It highlights that paths can be manipulated using sequences like /../, leading to potential security issues such as path traversal vulnerabilities, cache poisoning, and authentication bypass.</p><p><a href="https://swecyb.com/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> <a href="https://swecyb.com/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> <a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
mle✨<p>Going to <span class="h-card" translate="no"><a href="https://infosec.exchange/@BSidesLV" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>BSidesLV</span></a></span>? Don't miss these talks from <span class="h-card" translate="no"><a href="https://infosec.exchange/@censys" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>censys</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@greynoise" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>greynoise</span></a></span> researchers while you're there👇</p><p>🔸 Defensive Counting: How to quantify ICS exposure on the Internet when the data is out to get you (shameless self promotion, I'll be presenting this!)<br>Ground Truth, 15:00 Tuesday<br>Abstract: <a href="https://bsideslv.org/talks#LNDN9Z" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsideslv.org/talks#LNDN9Z</span><span class="invisible"></span></a></p><p>🔸 What Do We Learn When We Scan the Internet every hour? by <span class="h-card" translate="no"><a href="https://infosec.exchange/@amirian" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>amirian</span></a></span><br>Ground Truth, 15:30 Tuesday<br>Abstract: <a href="https://bsideslv.org/talks#DVYNJJ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsideslv.org/talks#DVYNJJ</span><span class="invisible"></span></a></p><p>🔸 Discover the Hidden Vulnerability Intelligence within CISA’s KEV Catalog by <span class="h-card" translate="no"><a href="https://infosec.exchange/@ntkramer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ntkramer</span></a></span><br>Ground Floor, 14:30 Wednesday<br>Abstract: <a href="https://bsideslv.org/talks#WXAEQR" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bsideslv.org/talks#WXAEQR</span><span class="invisible"></span></a></p><p>Hope to see you there!</p><p><a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/InternetMeasurement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetMeasurement</span></a> <a href="https://infosec.exchange/tags/KEV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KEV</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://infosec.exchange/tags/BSLV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSLV</span></a> <a href="https://infosec.exchange/tags/blackhat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blackhat</span></a> <a href="https://infosec.exchange/tags/defcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>defcon</span></a></p>
Mega<p>Working on a research paper on <a href="https://social.villains.live/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> that uses <a href="https://social.villains.live/tags/Discord" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Discord</span></a> as a Command &amp; Control server. I infect my own sandbox machine to observe and document behavior of published malware from GitHub and Discord bans me for policy violations.</p><p>Refuses to hear my appeal or investigate. Is this how security researchers are going to be treated?</p><p>Please boost to bring attention. Thx.</p><p><a href="https://social.villains.live/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://social.villains.live/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://social.villains.live/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://social.villains.live/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://social.villains.live/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.villains.live/tags/whitehat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whitehat</span></a> <a href="https://social.villains.live/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://social.villains.live/tags/securityresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityresearch</span></a></p>
mle✨<p>Imagine you have a friend who’s worked in security for nearly a decade and they’re feeling burned out. The spark is still there, they care about the work, but they are ✨tired✨. Nothing feels exciting or interesting anymore. </p><p>Apart from taking some time off, they’ve asked for podcast or book recs—stories that will help them feel that twinge of excitement, that will remind them of how rewarding and fascinating this field can be. </p><p>What do you suggest? </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/securityresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityresearch</span></a> <a href="https://infosec.exchange/tags/bookstodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bookstodon</span></a></p>